Stronger Security of Authenticated Key Exchange

From MaRDI portal
Revision as of 23:57, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3503867


DOI10.1007/978-3-540-75670-5_1zbMath1138.94381OpenAlexW2135654420MaRDI QIDQ3503867

Anton Mityagin, B. A. LaMacchia, Kristin E. Lauter

Publication date: 10 June 2008

Published in: Provable Security (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-75670-5_1



Related Items

Standard model leakage-resilient authenticated key exchange using inner-product extractors, Signed Diffie-Hellman key exchange with tight security, Another Look at Tightness, An efficient authenticated key exchange from random self-reducibility on CSIDH, Towards post-quantum security for signal's X3DH handshake, Practical isogeny-based key-exchange with optimal tightness, An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Stand-by Attacks on E-ID Password Authentication, Improved attacks against key reuse in learning with errors key exchange, More efficient post-quantum KEMTLS with pre-distributed public keys, Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange, Blake-Wilson, Johnson \& Menezes protocol revisited, An efficient certificateless two-party authenticated key agreement protocol, Strong authenticated key exchange with auxiliary inputs, Methodology for assessing the security of cryptographic protocols, Strengthening the security of authenticated key exchange against bad randomness, On the leakage-resilient key exchange, On security analysis of an after-the-fact leakage resilient key exchange protocol, Authenticated Key Exchange and Key Encapsulation in the Standard Model, Modular Design of Role-Symmetric Authenticated Key Exchange Protocols, A novel pairing-free certificateless authenticated key agreement protocol with provable security, A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption, Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\), Efficient Public-Key Distance Bounding Protocol, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, On optimal tightness for key exchange with full forward secrecy via key confirmation, Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness, Efficient One-Round Key Exchange in the Standard Model, Post-quantum asynchronous deniable key exchange and the signal handshake, Post-quantum anonymous one-sided authenticated key exchange without random oracles, Anonymity and one-way authentication in key exchange protocols, Authenticated confidential channel establishment and the security of TLS-DHE, Lattice-based authenticated key exchange with tight security, Almost tight multi-user security under adaptive corruptions from LWE in the standard model, Provably secure three-party password-based authenticated key exchange protocol, Two-pass authenticated key exchange with explicit authentication and tight security, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, CMQV+: an authenticated key exchange protocol from CMQV, A formal security analysis of the Signal messaging protocol, An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries, Security weaknesses of a signature scheme and authenticated key agreement protocols, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Strongly secure authenticated key exchange from factoring, codes, and lattices, A cryptographic analysis of the TLS 1.3 handshake protocol, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, A simple provably secure AKE from the LWE problem, Identity-based authenticated key agreement protocol based on Weil pairing, A Modular Security Analysis of EAP and IEEE 802.11, New approach to practical leakage-resilient public-key cryptography, Towards isogeny-based password-authenticated key establishment, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Authenticated Key Exchange with Entities from Different Settings and Varied Groups, Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol, Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys, Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Batch Computations Revisited: Combining Key Computations and Batch Verifications, Certificateless two-party authenticated key agreement scheme for smart grid, Generic authenticated key exchange in the quantum random oracle model, Privacy-preserving authenticated key exchange and the case of IKEv2, Towards Denial-of-Service-Resilient Key Agreement Protocols, Tightly-secure authenticated key exchange, revisited, Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage, TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption, Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security, Strongly Secure Certificateless Key Agreement, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique, A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys, On Forward Secrecy in One-Round Key Exchange, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols, Signed (group) Diffie-Hellman key exchange with tight security, Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract), Leaky Random Oracle (Extended Abstract), Strongly leakage resilient authenticated key exchange, revisited, Unilaterally-Authenticated Key Exchange, Quantifying the security cost of migrating protocols to practice, Revocable hierarchical identity-based authenticated key exchange, 0-RTT Key Exchange with Full Forward Secrecy, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles, Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols


Uses Software