An Efficient Deniable Key Exchange Protocol (Extended Abstract)
From MaRDI portal
Publication:3603003
DOI10.1007/978-3-540-85230-8_4zbMATH Open1175.94083OpenAlexW1508839005MaRDI QIDQ3603003FDOQ3603003
Authors: Shaoquan Jiang, Reihaneh Safavi-Naini
Publication date: 12 February 2009
Published in: Financial Cryptography and Data Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85230-8_4
Recommendations
Cited In (19)
- Privacy-preserving authenticated key exchange and the case of IKEv2
- Deniable version of SIGMA key exchange protocol resilient to ephemeral key leakage
- An efficient protocol for anonymous and fair document exchange.
- Information Security and Cryptology - ICISC 2005
- A deniable authenticated 2 party key agreement protocol from bilinear pairing
- DSH: Deniable Secret Handshake Framework
- Title not available (Why is that?)
- Explainable arguments
- One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
- Timed encryption with application to deniable key exchange
- Towards bidirectional ratcheted key exchange
- Bi-deniable public-key encryption protocol which is secure against active coercive adversary
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Deniable internet key exchange
- A new framework for deniable secure key exchange
- Title not available (Why is that?)
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
This page was built for publication: An Efficient Deniable Key Exchange Protocol (Extended Abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3603003)