Practical and tightly-secure digital signatures and authenticated key exchange

From MaRDI portal
Publication:1784083

DOI10.1007/978-3-319-96881-0_4zbMath1436.94104OpenAlexW2883305949MaRDI QIDQ1784083

Kristian Gjøsteen, Tibor Jager

Publication date: 26 September 2018

Full work available at URL: http://hdl.handle.net/11250/2591282




Related Items (34)

Generic construction for tightly-secure signatures from discrete logSigned Diffie-Hellman key exchange with tight securityHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableAuthenticated key exchange and signatures with tight security in the standard modelOptimal tightness for chain-based unique signaturesOn the concrete security of TLS 1.3 PSK modeOn tightly-secure (linkable) ring signaturesDigital Signatures with Memory-Tight Security in the Multi-challenge SettingAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelFuzzy authenticated key exchange with tight securityLattice-based signatures with tight adaptive corruptions and morePrivacy-preserving authenticated key exchange in the standard modelOn optimal tightness for key exchange with full forward secrecy via key confirmationKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessCryptographic analysis of the Bluetooth secure connection protocol suiteLattice-based authenticated key exchange with tight securityAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelUnbounded HIBE with tight securityTwo-pass authenticated key exchange with explicit authentication and tight securityTightly CCA-secure encryption scheme in a multi-user setting with corruptionsTight security for the generic construction of identity-based signature (in the multi-instance setting)Generalized public-key cryptography with tight securitySession resumption protocols and efficient forward security for TLS 1.3 0-RTTOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsSignatures from sequential-OR proofsTightly-secure authenticated key exchange, revisitedMore efficient digital signatures with tight multi-user securityAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableSigned (group) Diffie-Hellman key exchange with tight securityTightly secure signature schemes from the LWE and subset sum assumptionsEfficient and tight oblivious transfer from PKE with tight multi-user securityTighter proofs for the SIGMA and TLS 1.3 key exchange protocolsShort identity-based signatures with tight security from lattices




This page was built for publication: Practical and tightly-secure digital signatures and authenticated key exchange