Practical and tightly-secure digital signatures and authenticated key exchange
From MaRDI portal
Publication:1784083
DOI10.1007/978-3-319-96881-0_4zbMATH Open1436.94104OpenAlexW2883305949MaRDI QIDQ1784083FDOQ1784083
Authors: Kristian Gjøsteen, Tibor Jager
Publication date: 26 September 2018
Full work available at URL: http://hdl.handle.net/11250/2591282
Recommendations
- Authenticated key exchange and signatures with tight security in the standard model
- Tightly secure signatures and public-key encryption
- Tightly Secure Signatures and Public-Key Encryption
- Practical and provably secure release of a secret and exchange of signatures
- Publication:4934739
- Signed Diffie-Hellman key exchange with tight security
- Practical verifiably encrypted signatures without random oracles
- Verifiably encrypted signatures: security revisited and a new construction
- Verifiable encryption of digital signatures and applications
- Fully-Secure and Practical Sanitizable Signatures
Cited In (44)
- Generic construction for tightly-secure signatures from discrete log
- Signed Diffie-Hellman key exchange with tight security
- Tightly secure signature schemes from the LWE and subset sum assumptions
- On optimal tightness for key exchange with full forward secrecy via key confirmation
- Short identity-based signatures with tight security from lattices
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- Authenticated key exchange and signatures with tight security in the standard model
- Unbounded HIBE with tight security
- Fuzzy authenticated key exchange with tight security
- Digital Signatures with Memory-Tight Security in the Multi-challenge Setting
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- Tighter security for generic authenticated key exchange in the QROM
- Hierarchical identity-based encryption with tight multi-challenge security
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- More efficient digital signatures with tight multi-user security
- Almost tight multi-user security under adaptive corruptions from LWE in the standard model
- Lattice-based authenticated key exchange with tight security
- Lattice-based signatures with tight adaptive corruptions and more
- Cryptographic analysis of the Bluetooth secure connection protocol suite
- On the concrete security of TLS 1.3 PSK mode
- Efficient and tight oblivious transfer from PKE with tight multi-user security
- Optimal tightness for chain-based unique signatures
- Signatures from sequential-OR proofs
- Toothpicks: more efficient fork-free two-round multi-signatures
- Key exchange with tight (full) forward secrecy via key confirmation
- Tightly-secure authenticated key exchange, revisited
- On tightly-secure (linkable) ring signatures
- Title not available (Why is that?)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Signed (group) Diffie-Hellman key exchange with tight security
- Two-pass authenticated key exchange with explicit authentication and tight security
- Privacy-preserving authenticated key exchange in the standard model
- Fully-Secure and Practical Sanitizable Signatures
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Generalized public-key cryptography with tight security
- Tightly Secure Signatures and Public-Key Encryption
- Tightly secure lattice identity-based signature in the quantum random oracle model
- Tight security for the generic construction of identity-based signature (in the multi-instance setting)
- New efficient and secure protocols for verifiable signature sharing and other applications
- Tightly-secure authenticated key exchange
This page was built for publication: Practical and tightly-secure digital signatures and authenticated key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784083)