Authenticated key exchange and signatures with tight security in the standard model
From MaRDI portal
Publication:2139653
DOI10.1007/978-3-030-84259-8_23zbMATH Open1489.94123OpenAlexW3185386066WikidataQ126176071 ScholiaQ126176071MaRDI QIDQ2139653FDOQ2139653
Eike Kiltz, Shuai Han, Shengli Liu, Sven Schäge, Tibor Jager, Doreen Riepel, Jia-xin Pan
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_23
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Tightly-secure authenticated key exchange, revisited
- An Algebraic Framework for Diffie-Hellman Assumptions
- An algebraic framework for Diffie-Hellman assumptions
- On the Impossibility of Tight Cryptographic Reductions
- More efficient digital signatures with tight multi-user security
- Bounded CCA2-Secure Encryption
- Tightly CCA-Secure Encryption Without Pairings
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Tightly secure hierarchical identity-based encryption
- Tightly-Secure Authenticated Key Exchange
- Practical and tightly-secure digital signatures and authenticated key exchange
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- On the Security of TLS-DHE in the Standard Model
- The Kernel Matrix Diffie-Hellman Assumption
- Kurosawa-Desmedt meets tight security
- Two-pass authenticated key exchange with explicit authentication and tight security
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- On the adaptive security of MACs and PRFs
- Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols
- Unbounded HIBE with tight security
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
Cited In (20)
- Signed Diffie-Hellman key exchange with tight security
- On optimal tightness for key exchange with full forward secrecy via key confirmation
- Practical and tightly-secure digital signatures and authenticated key exchange
- Fuzzy authenticated key exchange with tight security
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- Tighter security for generic authenticated key exchange in the QROM
- A New Security Model for Authenticated Key Agreement
- Fine-grained verifier NIZK and its applications
- Almost tight multi-user security under adaptive corruptions from LWE in the standard model
- Lattice-based authenticated key exchange with tight security
- Lattice-based signatures with tight adaptive corruptions and more
- On the concrete security of TLS 1.3 PSK mode
- Optimal tightness for chain-based unique signatures
- Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions
- Toothpicks: more efficient fork-free two-round multi-signatures
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Two-pass authenticated key exchange with explicit authentication and tight security
- Security model for authenticated key exchange, reconsidered
- Tightly Secure Signatures and Public-Key Encryption
- Two-message authenticated key exchange from public-key encryption
Uses Software
This page was built for publication: Authenticated key exchange and signatures with tight security in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2139653)