An Efficient Deniable Key Exchange Protocol (Extended Abstract)
From MaRDI portal
Publication:3603003
Recommendations
Cited in
(19)- Privacy-preserving authenticated key exchange and the case of IKEv2
- Deniable version of SIGMA key exchange protocol resilient to ephemeral key leakage
- An efficient protocol for anonymous and fair document exchange.
- Information Security and Cryptology - ICISC 2005
- A deniable authenticated 2 party key agreement protocol from bilinear pairing
- DSH: Deniable Secret Handshake Framework
- scientific article; zbMATH DE number 1759477 (Why is no real title available?)
- Explainable arguments
- One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
- Timed encryption with application to deniable key exchange
- Towards bidirectional ratcheted key exchange
- Bi-deniable public-key encryption protocol which is secure against active coercive adversary
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- A new framework for deniable secure key exchange
- Deniable internet key exchange
- scientific article; zbMATH DE number 1925555 (Why is no real title available?)
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
This page was built for publication: An Efficient Deniable Key Exchange Protocol (Extended Abstract)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3603003)