scientific article

From MaRDI portal
Publication:2724585

zbMath0984.94509MaRDI QIDQ2724585

David Pointcheval, Tatsuaki Okamoto

Publication date: 5 May 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

An efficient authenticated key exchange from random self-reducibility on CSIDH, Towards post-quantum security for signal's X3DH handshake, Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract), An Efficient and Provably Secure Certificate-Based Encryption Scheme, Blake-Wilson, Johnson \& Menezes protocol revisited, Efficient cryptosystems from \(2^k\)-th power residue symbols, Strengthening the security of authenticated key exchange against bad randomness, On security analysis of an after-the-fact leakage resilient key exchange protocol, The One-More Discrete Logarithm Assumption in the Generic Group Model, Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\), Efficient Public-Key Distance Bounding Protocol, New results and applications for multi-secret sharing schemes, Sherlock Holmes zero-knowledge protocols, Generic Constructions of Stateful Public Key Encryption and Their Applications, Generic constructions of identity-based and certificateless kEMs, Memory-tight multi-challenge security of public-key encryption, Efficient NIZKs for algebraic sets, Identity-based chameleon hashing and signatures without key exposure, Secure multiparty computation from threshold encryption based on class groups, A formal security analysis of the Signal messaging protocol, Short undeniable signatures based on group homomorphisms, New technique for chosen-ciphertext security based on non-interactive zero-knowledge, Offline witness encryption with semi-adaptive security, Signcryption Schemes Based on the Diffie–Hellman Problem, Applications of Signcryption, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, Identification Schemes from Key Encapsulation Mechanisms, Certificateless one-pass and two-party authenticated key agreement protocol and its extensions, New Constructions and Applications of Trapdoor DDH Groups, Identity-based authenticated key agreement protocol based on Weil pairing, Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol, Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks, Automating Computational Proofs for Public-Key-Based Key Exchange, Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption, Simulatable certificateless two-party authenticated key agreement protocol, Identity-based trapdoor mercurial commitments and applications, Post-Quantum Forward-Secure Onion Routing, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, On the Connection Between Signcryption and One-Pass Key Establishment, Generic constructions of integrated PKE and PEKS, A Generic Construction for Universally-Convertible Undeniable Signatures, The Twin Diffie-Hellman Problem and Applications, Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys, On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes, Separation Results on the “One-More” Computational Problems, An improved identity-based key agreement protocol and its security proof, On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Everybody's a target: scalability in public-key encryption, Towards Denial-of-Service-Resilient Key Agreement Protocols, TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption, Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique, Identity-Based Deterministic Signature Scheme without Forking-Lemma, On Forward Secrecy in One-Round Key Exchange, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols, On the complexity of the discrete logarithm and Diffie-Hellman problems, The twin Diffie-Hellman problem and applications, Leaky Random Oracle (Extended Abstract), Certificateless signature and proxy signature schemes from bilinear pairings, Quantifying the security cost of migrating protocols to practice, Anonymous tokens with private metadata bit, A classification of computational assumptions in the algebraic group model, A Public-Key Encryption Scheme with Pseudo-random Ciphertexts, IND-CCA secure encryption based on a Zheng-Seberry scheme, Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols