Strongly secure key exchange protocol with minimal KEM
From MaRDI portal
Publication:1631908
DOI10.1007/978-3-319-17533-1_10zbMATH Open1403.94082OpenAlexW804072445MaRDI QIDQ1631908FDOQ1631908
Authors: Baoping Tian, Fushan Wei, Chuangui Ma
Publication date: 7 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-17533-1_10
Recommendations
- Two-pass authenticated key exchange with explicit authentication and tight security
- 2-pass key exchange protocols from CPA-secure KEM
- Tightly secure two-pass authenticated key exchange protocol in the CK model
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Compact authenticated key exchange from bounded CCA-secure KEM
Cited In (10)
- Understanding and constructing AKE via double-key key encapsulation mechanism
- Efficient One-Round Key Exchange in the Standard Model
- One-round authenticated key exchange without implementation trick
- Compact authenticated key exchange from bounded CCA-secure KEM
- 2-pass key exchange protocols from CPA-secure KEM
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Tightly secure two-pass authenticated key exchange protocol in the CK model
- Two-pass authenticated key exchange with explicit authentication and tight security
- Modular design of KEM-based authenticated key exchange
- Two-message authenticated key exchange from public-key encryption
This page was built for publication: Strongly secure key exchange protocol with minimal KEM
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1631908)