Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
From MaRDI portal
Publication:2117066
DOI10.1007/978-3-030-78375-4_18zbMATH Open1491.94044OpenAlexW3090969679MaRDI QIDQ2117066FDOQ2117066
Publication date: 21 March 2022
Full work available at URL: http://hdl.handle.net/20.500.11850/452409
Recommendations
- Highly efficient key exchange protocols with optimal tightness
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- Signed (group) Diffie-Hellman key exchange with tight security
- A cryptographic analysis of the TLS 1.3 handshake protocol
- On the concrete security of TLS 1.3 PSK mode
Cites Work
- Authenticated key exchange secure against dictionary attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2005
- Cryptography and Coding
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Advances in Cryptology - CRYPTO 2003
- On the Impossibility of Tight Cryptographic Reductions
- Tightly-Secure Authenticated Key Exchange
- Practical and tightly-secure digital signatures and authenticated key exchange
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Highly efficient key exchange protocols with optimal tightness
- Title not available (Why is that?)
- On the Security of TLS-DHE in the Standard Model
- PRF-ODH: relations, instantiations, and impossibility results
- Algorithmic number theory. 3rd international symposium, ANTS-III, Portland, OR, USA, June 21--25, 1998. Proceedings
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Title not available (Why is that?)
Cited In (14)
- Key-schedule security for the TLS 1.3 standard
- Authenticated key exchange and signatures with tight security in the standard model
- Multipath TLS 1.3
- Lattice-based authenticated key exchange with tight security
- Lattice-based signatures with tight adaptive corruptions and more
- On the concrete security of TLS 1.3 PSK mode
- On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3
- Computational security analysis of the full EDHOC protocol
- Toothpicks: more efficient fork-free two-round multi-signatures
- Key exchange with tight (full) forward secrecy via key confirmation
- Recovering the tight security proof of SPHINCS\textsuperscript{+}
- Advances in Cryptology - CRYPTO 2003
- Signed (group) Diffie-Hellman key exchange with tight security
- KEMTLS with delayed forward identity protection in (almost) a single round trip
Uses Software
This page was built for publication: Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117066)