Authenticated key exchange and signatures with tight security in the standard model
From MaRDI portal
Publication:2139653
DOI10.1007/978-3-030-84259-8_23zbMath1489.94123OpenAlexW3185386066WikidataQ126176071 ScholiaQ126176071MaRDI QIDQ2139653
Eike Kiltz, Shuai Han, Shengli Liu, Sven Schäge, Tibor Jager, Doreen Riepel, Jia-xin Pan
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_23
Related Items (11)
Optimal tightness for chain-based unique signatures ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Fine-grained verifier NIZK and its applications ⋮ Fuzzy authenticated key exchange with tight security ⋮ Lattice-based signatures with tight adaptive corruptions and more ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Lattice-based authenticated key exchange with tight security ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An algebraic framework for Diffie-Hellman assumptions
- Kurosawa-Desmedt meets tight security
- Practical and tightly-secure digital signatures and authenticated key exchange
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- Tightly-secure authenticated key exchange, revisited
- More efficient digital signatures with tight multi-user security
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- On the adaptive security of MACs and PRFs
- Unbounded HIBE with tight security
- Two-pass authenticated key exchange with explicit authentication and tight security
- Tightly CCA-Secure Encryption Without Pairings
- An Algebraic Framework for Diffie-Hellman Assumptions
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- On the Security of TLS-DHE in the Standard Model
- The Kernel Matrix Diffie-Hellman Assumption
- Bounded CCA2-Secure Encryption
- Tightly-Secure Authenticated Key Exchange
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- On the Impossibility of Tight Cryptographic Reductions
- Tightly secure hierarchical identity-based encryption
This page was built for publication: Authenticated key exchange and signatures with tight security in the standard model