Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
From MaRDI portal
Publication:1008987
DOI10.1007/S10623-007-9159-1zbMATH Open1178.94205OpenAlexW2037090944MaRDI QIDQ1008987FDOQ1008987
Authors: Berkant Ustaoglu
Publication date: 31 March 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11147/4768
Recommendations
- A New Key Exchange Protocol Based on MQV Assuming Public Computations
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- On the security of the (F)HMQV protocol
- An efficient protocol for authenticated key agreement
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Key agreement protocols and their security analysis
- scientific article; zbMATH DE number 1583810
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- scientific article; zbMATH DE number 1440045
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Title not available (Why is that?)
- Security arguments for digital signatures and blind signatures
- Authenticated key exchange secure against dictionary attacks
- About the Security of MTI/C0 and MQV
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Public Key Cryptography - PKC 2006
- Advances in Cryptology – CRYPTO 2004
- An efficient protocol for authenticated key agreement
- Title not available (Why is that?)
- Validation of Elliptic Curve Public Keys
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Another look at HMQV
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Title not available (Why is that?)
Cited In (28)
- Towards post-quantum security for signal's X3DH handshake
- A simple provably secure AKE from the LWE problem
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- Efficient public-key distance bounding protocol
- Provably secure three-party password-based authenticated key exchange protocol
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- On Forward Secrecy in One-Round Key Exchange
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- Strongly Secure Certificateless Key Agreement
- Leaky Random Oracle (Extended Abstract)
- Improved attacks against key reuse in learning with errors key exchange
- A strongly secure identity-based authenticated group key exchange protocol
- NAXOS
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- CMQV+: an authenticated key exchange protocol from CMQV
- Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
- Another look at tightness
- On the leakage-resilient key exchange
- Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
- A conference key distribution system
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- Strengthening the security of authenticated key exchange against bad randomness
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- A secure and efficient on-line/off-line group key distribution protocol
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- Characterization of strongly secure authenticated key exchanges without NAXOS technique
Uses Software
This page was built for publication: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1008987)