An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
From MaRDI portal
Publication:2061966
DOI10.1007/978-3-030-75248-4_15OpenAlexW3165739159MaRDI QIDQ2061966
Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest, Keitaro Hashimoto
Publication date: 21 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75248-4_15
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer system organization (68Mxx)
Related Items (6)
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ A more complete analysis of the signal double ratchet algorithm ⋮ Continuous authentication in secure messaging ⋮ Post-quantum signal key agreement from SIDH ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- New proofs for NMAC and HMAC: security without collision resistance
- Towards bidirectional ratcheted key exchange
- Ratcheted encryption and key exchange: the security of messaging
- Understanding and constructing AKE via double-key key encapsulation mechanism
- Practical and tightly-secure digital signatures and authenticated key exchange
- Generic authenticated key exchange in the quantum random oracle model
- Tightly-secure authenticated key exchange, revisited
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- A unified and composable take on ratcheting
- A formal security analysis of the Signal messaging protocol
- On the cryptographic deniability of the Signal protocol
- Two-message key exchange with strong security from ideal lattices
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Highly efficient key exchange protocols with optimal tightness
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness
- Forward Secure Non-Interactive Key Exchange
- Stronger Security of Authenticated Key Exchange
- Deniable Internet Key Exchange
- Composability and On-Line Deniability of Authentication
- Key agreement protocols and their security analysis
- Non-Interactive Key Exchange
- Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange
- Tightly-Secure Authenticated Key Exchange
- 2-Pass Key Exchange Protocols from CPA-Secure KEM
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- The Twin Diffie-Hellman Problem and Applications
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- Public Key Cryptography - PKC 2006
This page was built for publication: An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable