Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
From MaRDI portal
Publication:2900236
DOI10.1007/978-3-642-30057-8_28zbMath1300.94106OpenAlexW1859498317MaRDI QIDQ2900236
Kazuki Yoneyama, Koutarou Suzuki, Keita Xagawa, Atsushi Fujioka
Publication date: 20 July 2012
Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_28
Related Items (13)
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Post-Quantum Forward-Secure Onion Routing ⋮ Authenticated Key Exchange with Entities from Different Settings and Varied Groups ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ Tightly-secure authenticated key exchange, revisited ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
Uses Software
This page was built for publication: Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices