Practical and tightly-secure digital signatures and authenticated key exchange
From MaRDI portal
Publication:1784083
DOI10.1007/978-3-319-96881-0_4zbMath1436.94104OpenAlexW2883305949MaRDI QIDQ1784083
Kristian Gjøsteen, Tibor Jager
Publication date: 26 September 2018
Full work available at URL: http://hdl.handle.net/11250/2591282
Related Items (34)
Generic construction for tightly-secure signatures from discrete log ⋮ Signed Diffie-Hellman key exchange with tight security ⋮ Hierarchical Identity-Based Encryption with Tight Multi-challenge Security ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Optimal tightness for chain-based unique signatures ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ On tightly-secure (linkable) ring signatures ⋮ Digital Signatures with Memory-Tight Security in the Multi-challenge Setting ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Fuzzy authenticated key exchange with tight security ⋮ Lattice-based signatures with tight adaptive corruptions and more ⋮ Privacy-preserving authenticated key exchange in the standard model ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Cryptographic analysis of the Bluetooth secure connection protocol suite ⋮ Lattice-based authenticated key exchange with tight security ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model ⋮ Unbounded HIBE with tight security ⋮ Two-pass authenticated key exchange with explicit authentication and tight security ⋮ Tightly CCA-secure encryption scheme in a multi-user setting with corruptions ⋮ Tight security for the generic construction of identity-based signature (in the multi-instance setting) ⋮ Generalized public-key cryptography with tight security ⋮ Session resumption protocols and efficient forward security for TLS 1.3 0-RTT ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ Signatures from sequential-OR proofs ⋮ Tightly-secure authenticated key exchange, revisited ⋮ More efficient digital signatures with tight multi-user security ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Tightly secure signature schemes from the LWE and subset sum assumptions ⋮ Efficient and tight oblivious transfer from PKE with tight multi-user security ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols ⋮ Short identity-based signatures with tight security from lattices
This page was built for publication: Practical and tightly-secure digital signatures and authenticated key exchange