Two-pass authenticated key exchange with explicit authentication and tight security
From MaRDI portal
Publication:2692405
DOI10.1007/978-3-030-64834-3_27OpenAlexW3089351364MaRDI QIDQ2692405
Shengli Liu, Jian Weng, Xiang-Yu Liu, Da-Wu Gu
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64834-3_27
Related Items (13)
Authenticated key exchange and signatures with tight security in the standard model ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Digital Signatures with Memory-Tight Security in the Multi-challenge Setting ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Fuzzy authenticated key exchange with tight security ⋮ Lattice-based signatures with tight adaptive corruptions and more ⋮ Privacy-preserving authenticated key exchange in the standard model ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Lattice-based authenticated key exchange with tight security ⋮ Tightly-secure authenticated key exchange, revisited ⋮ More efficient digital signatures with tight multi-user security ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Efficient and tight oblivious transfer from PKE with tight multi-user security
Uses Software
Cites Work
- Tightly secure two-pass authenticated key exchange protocol in the CK model
- Practical and tightly-secure digital signatures and authenticated key exchange
- Generic and practical key establishment from lattice
- Highly efficient key exchange protocols with optimal tightness
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- An Algebraic Framework for Diffie-Hellman Assumptions
- Lattice Cryptography for the Internet
- One-Pass HMQV and Asymmetric Key-Wrapping
- Stronger Security of Authenticated Key Exchange
- Tightly-Secure Authenticated Key Exchange
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- The Twin Diffie-Hellman Problem and Applications
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Two-pass authenticated key exchange with explicit authentication and tight security