On tightly secure non-interactive key exchange
From MaRDI portal
Publication:1784082
DOI10.1007/978-3-319-96881-0_3zbMATH Open1430.94074OpenAlexW2794684464MaRDI QIDQ1784082FDOQ1784082
Authors: Julia Hesse, Dennis Hofheinz, Lisa Kohl
Publication date: 26 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96881-0_3
Recommendations
Cited In (20)
- Fine-grained cryptography revisited
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
- On the multi-user security of LWE-based NIKE
- Unbounded HIBE with tight security
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- Non-interactive key exchange
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Universally Composable Non-Interactive Key Exchange
- Adaptive multiparty NIKE
- Optimal tightness for chain-based unique signatures
- Towards bidirectional ratcheted key exchange
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Fine-grained non-interactive key-exchange without idealized assumptions
- Deniable authentication when signing keys leak
- Towards tight adaptive security of non-interactive key exchange
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Generalized public-key cryptography with tight security
- Tightly secure hierarchical identity-based encryption
- NIKE from affine determinant programs
- Black-box use of one-way functions is useless for optimal fair coin-tossing
This page was built for publication: On tightly secure non-interactive key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784082)