Stronger Security of Authenticated Key Exchange

From MaRDI portal
Publication:3503867


DOI10.1007/978-3-540-75670-5_1zbMath1138.94381MaRDI QIDQ3503867

Anton Mityagin, B. A. LaMacchia, Kristin E. Lauter

Publication date: 10 June 2008

Published in: Provable Security (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-75670-5_1


94A62: Authentication, digital signatures and secret sharing


Related Items

One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Methodology for assessing the security of cryptographic protocols, Authenticated Key Exchange with Entities from Different Settings and Varied Groups, 0-RTT Key Exchange with Full Forward Secrecy, Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract), Leaky Random Oracle (Extended Abstract), A Modular Security Analysis of EAP and IEEE 802.11, Unilaterally-Authenticated Key Exchange, Modular Design of Role-Symmetric Authenticated Key Exchange Protocols, A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption, Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\), On optimal tightness for key exchange with full forward secrecy via key confirmation, Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness, Post-quantum asynchronous deniable key exchange and the signal handshake, Post-quantum anonymous one-sided authenticated key exchange without random oracles, Lattice-based authenticated key exchange with tight security, Almost tight multi-user security under adaptive corruptions from LWE in the standard model, Blake-Wilson, Johnson \& Menezes protocol revisited, An efficient certificateless two-party authenticated key agreement protocol, Provably secure three-party password-based authenticated key exchange protocol, CMQV+: an authenticated key exchange protocol from CMQV, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Strongly secure authenticated key exchange from factoring, codes, and lattices, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, Signed Diffie-Hellman key exchange with tight security, An efficient authenticated key exchange from random self-reducibility on CSIDH, Towards post-quantum security for signal's X3DH handshake, Practical isogeny-based key-exchange with optimal tightness, On security analysis of an after-the-fact leakage resilient key exchange protocol, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, On the leakage-resilient key exchange, Authenticated confidential channel establishment and the security of TLS-DHE, Anonymity and one-way authentication in key exchange protocols, A cryptographic analysis of the TLS 1.3 handshake protocol, A simple provably secure AKE from the LWE problem, New approach to practical leakage-resilient public-key cryptography, Towards isogeny-based password-authenticated key establishment, Certificateless two-party authenticated key agreement scheme for smart grid, Generic authenticated key exchange in the quantum random oracle model, Privacy-preserving authenticated key exchange and the case of IKEv2, Tightly-secure authenticated key exchange, revisited, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Signed (group) Diffie-Hellman key exchange with tight security, Quantifying the security cost of migrating protocols to practice, Revocable hierarchical identity-based authenticated key exchange, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles, Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols, Standard model leakage-resilient authenticated key exchange using inner-product extractors, An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Improved attacks against key reuse in learning with errors key exchange, More efficient post-quantum KEMTLS with pre-distributed public keys, A formal security analysis of the Signal messaging protocol, An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries, Strongly secure identity-based authenticated key agreement protocols without bilinear pairings, Strongly leakage resilient authenticated key exchange, revisited, Strong authenticated key exchange with auxiliary inputs, Strengthening the security of authenticated key exchange against bad randomness, A novel pairing-free certificateless authenticated key agreement protocol with provable security, Security weaknesses of a signature scheme and authenticated key agreement protocols, Two-pass authenticated key exchange with explicit authentication and tight security, Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol, Another Look at Tightness, Efficient Public-Key Distance Bounding Protocol, One-Round Attribute-Based Key Exchange in the Multi-party Setting, Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message, Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys, Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols, Batch Computations Revisited: Combining Key Computations and Batch Verifications, Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage, TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption, Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security, Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique, A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys, On Forward Secrecy in One-Round Key Exchange, Strongly Secure Certificateless Key Agreement, Stand-by Attacks on E-ID Password Authentication, Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange, Authenticated Key Exchange and Key Encapsulation in the Standard Model, Efficient One-Round Key Exchange in the Standard Model, Identity-based authenticated key agreement protocol based on Weil pairing, Towards Denial-of-Service-Resilient Key Agreement Protocols, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols


Uses Software