HMQV: A High-Performance Secure Diffie-Hellman Protocol

From MaRDI portal
Revision as of 10:26, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5451048

DOI10.1007/11535218_33zbMath1145.94445DBLPconf/crypto/Krawczyk05OpenAlexW2117455301WikidataQ56475230 ScholiaQ56475230MaRDI QIDQ5451048

Hugo Krawczyk

Publication date: 17 March 2008

Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11535218_33




Related Items (96)

A key manipulation attack on some recent isogeny-based key agreement protocolsAnother Look at TightnessAn efficient authenticated key exchange from random self-reducibility on CSIDHTowards post-quantum security for signal's X3DH handshakePractical isogeny-based key-exchange with optimal tightnessAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableShort variable length domain extenders with beyond birthday bound securityAuthenticated key exchange and signatures with tight security in the standard modelKHAPE: Asymmetric PAKE from key-hiding key exchangeFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteDecaf: Eliminating Cofactors Through Point CompressionImproved attacks against key reuse in learning with errors key exchangeMore efficient post-quantum KEMTLS with pre-distributed public keysPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeFull indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) methodBlake-Wilson, Johnson \& Menezes protocol revisitedAsymmetric PAKE with low computation \textit{and} communicationOn the concrete security of TLS 1.3 PSK modeMethodology for assessing the security of cryptographic protocolsStrengthening the security of authenticated key exchange against bad randomnessA new framework for deniable secure key exchangeOn security analysis of an after-the-fact leakage resilient key exchange protocolAuthenticated Key Exchange and Key Encapsulation in the Standard ModelSymmetric Key Exchange with Full Forward Security and Robust SynchronizationModular Design of Role-Symmetric Authenticated Key Exchange ProtocolsMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Efficient Public-Key Distance Bounding ProtocolOne-Round Attribute-Based Key Exchange in the Multi-party SettingRandomized half-ideal cipher on groups with applications to UC (a)PAKEA security weakness in Abdalla et al.'s generic construction of a group key exchange protocolFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesDSH: Deniable Secret Handshake FrameworkCertificateless public key encryption: a new generic construction and two pairing-free schemesOn optimal tightness for key exchange with full forward secrecy via key confirmationKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessEfficient One-Round Key Exchange in the Standard ModelPost-quantum asynchronous deniable key exchange and the signal handshakePost-quantum anonymous one-sided authenticated key exchange without random oraclesAnonymity and one-way authentication in key exchange protocolsExtended KCI attack against two-party key establishment protocolsAuthenticated confidential channel establishment and the security of TLS-DHELattice-based authenticated key exchange with tight securityProvably secure three-party password-based authenticated key exchange protocolTwo-pass authenticated key exchange with explicit authentication and tight securityOne-Round Attribute-Based Key Exchange in the Multi-Party SettingCMQV+: an authenticated key exchange protocol from CMQVOn weaknesses of the HDCP authentication and key exchange protocol and its repairProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldA formal security analysis of the Signal messaging protocolState separation for code-based game-playing proofsResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksKey Establishment Using Signcryption TechniquesBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsStrongly secure authenticated key exchange from factoring, codes, and latticesО криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsCertificateless one-pass and two-party authenticated key agreement protocol and its extensionsPreserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymityA simple provably secure AKE from the LWE problemNon-Interactive Key ExchangeIdentity-based authenticated key agreement protocol based on Weil pairingA Modular Security Analysis of EAP and IEEE 802.11The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard ModelA Provably Secure One-Pass Two-Party Key Establishment ProtocolAn efficient and secure two-flow zero-knowledge identification protocolAnother look at HMQVAnother look at automated theorem-provingPost-Quantum Forward-Secure Onion RoutingOn the Connection Between Signcryption and One-Pass Key EstablishmentAuthenticated Key Exchange with Entities from Different Settings and Varied GroupsSecurity Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) ProtocolDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysAn improved identity-based key agreement protocol and its security proofObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSGeneric authenticated key exchange in the quantum random oracle modelPrivacy-preserving authenticated key exchange and the case of IKEv2Towards Denial-of-Service-Resilient Key Agreement ProtocolsTightly-secure authenticated key exchange, revisitedGroup key exchange protocols from supersingular isogeniesHMQVPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessTaxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageTMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionStrongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward SecurityStrongly Secure Certificateless Key AgreementOn the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blindingAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueOn Forward Secrecy in One-Round Key ExchangeComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsUnilaterally-Authenticated Key ExchangeUniversally composable relaxed password authenticated key exchangeA conference key distribution system0-RTT Key Exchange with Full Forward Secrecy






This page was built for publication: HMQV: A High-Performance Secure Diffie-Hellman Protocol