Tightly-secure authenticated key exchange, revisited
From MaRDI portal
Publication:2056675
DOI10.1007/978-3-030-77870-5_5zbMath1479.94325OpenAlexW3096322229MaRDI QIDQ2056675
Doreen Riepel, Sven Schäge, Eike Kiltz, Tibor Jager
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77870-5_5
Related Items (18)
Signed Diffie-Hellman key exchange with tight security ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Tightness subtleties for multi-user PKE notions ⋮ Optimal tightness for chain-based unique signatures ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) ⋮ Multi-instance secure public-key encryption ⋮ Lattice-based signatures with tight adaptive corruptions and more ⋮ Compact and tightly selective-opening secure public-key encryption schemes ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Lattice-based authenticated key exchange with tight security ⋮ Tightly-secure authenticated key exchange, revisited ⋮ More efficient digital signatures with tight multi-user security ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Efficient and tight oblivious transfer from PKE with tight multi-user security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Practical and tightly-secure digital signatures and authenticated key exchange
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- Generic authenticated key exchange in the quantum random oracle model
- Tightly-secure authenticated key exchange, revisited
- Highly efficient key exchange protocols with optimal tightness
- Two-pass authenticated key exchange with explicit authentication and tight security
- Tightly CCA-Secure Encryption Without Pairings
- An Algebraic Framework for Diffie-Hellman Assumptions
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- On the Security of TLS-DHE in the Standard Model
- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
- On Forward Secrecy in One-Round Key Exchange
- Stronger Security of Authenticated Key Exchange
- A New Randomness Extraction Paradigm for Hybrid Encryption
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
- Non-Interactive Key Exchange
- New Modular Compilers for Authenticated Key Exchange
- Tightly-Secure Authenticated Key Exchange
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Modular Security Proofs for Key Agreement Protocols
- On the Impossibility of Tight Cryptographic Reductions
- Public Key Cryptography - PKC 2006
This page was built for publication: Tightly-secure authenticated key exchange, revisited