Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
From MaRDI portal
Publication:488261
DOI10.1007/s10623-013-9852-1zbMath1351.94038WikidataQ57569029 ScholiaQ57569029MaRDI QIDQ488261
Michèle Feltz, C. J. F. Cremers
Publication date: 23 January 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-013-9852-1
key exchange; actor compromise; ephemeral-key reveal; perfect forward secrecy; protocol transformations; security models
94A60: Cryptography
Related Items
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange, On optimal tightness for key exchange with full forward secrecy via key confirmation, One-round identity-based key exchange with perfect forward security, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, Strongly secure authenticated key exchange from factoring, codes, and lattices, Short variable length domain extenders with beyond birthday bound security, State separation for code-based game-playing proofs, An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Strengthening the security of authenticated key exchange against bad randomness
Uses Software
Cites Work
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- One-round key exchange in the standard model
- On Forward Secrecy in One-Round Key Exchange
- Stronger Security of Authenticated Key Exchange
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
- Applied Cryptography and Network Security
- Advances in Cryptology - CRYPTO 2003
- Another look at HMQV
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Cryptography and Coding
- Public Key Cryptography - PKC 2006
- Public Key Cryptography - PKC 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item