More efficient post-quantum KEMTLS with pre-distributed public keys
From MaRDI portal
Publication:2146154
DOI10.1007/978-3-030-88418-5_1OpenAlexW3202691700MaRDI QIDQ2146154FDOQ2146154
Authors: Peter Schwabe, Douglas Stebila, Thom Wiggers
Publication date: 15 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88418-5_1
Recommendations
- Efficient circuit-size independent public key encryption with KDM security
- Post-quantum static-static key agreement using multiple protocol instances
- Anonymous, robust post-quantum public key encryption
- A practical post-quantum public-key cryptosystem based on spLWE
- Efficient public-key cryptography in the presence of key leakage
- Efficient public-key operation in multivariate schemes
- Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Better preprocessing for secure multiparty computation
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Computer security (68M25)
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Post-quantum key exchange for the Internet and the open quantum safe project
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Composability and On-Line Deniability of Authentication
- Title not available (Why is that?)
- An efficient protocol for authenticated key agreement
- Cryptographic extraction and key derivation: the HKDF scheme
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Benchmarking Post-quantum Cryptography in TLS
- Transitioning to a quantum-resistant public key infrastructure
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Generic forward-secure key agreement without signatures
Cited In (4)
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- Post-quantum hybrid KEMTLS performance in simulated and real network environments
- Modular design of KEM-based authenticated key exchange
- KEMTLS with delayed forward identity protection in (almost) a single round trip
Uses Software
This page was built for publication: More efficient post-quantum KEMTLS with pre-distributed public keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2146154)