Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
From MaRDI portal
Publication:488261
Recommendations
- Continuous after-the-fact leakage-resilient eCK-secure key exchange
- scientific article; zbMATH DE number 1962139
- Efficient eCK -secure authenticated key exchange protocols in the standard model
- An eCK-secure authenticated key exchange protocol without random oracles
- Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- scientific article; zbMATH DE number 1222849
Cites work
- scientific article; zbMATH DE number 1618043 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1263181 (Why is no real title available?)
- scientific article; zbMATH DE number 1341873 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- Another look at HMQV
- Applied Cryptography and Network Security
- Authenticated key exchange secure against dictionary attacks
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Cryptography and Coding
- Degrees of security: protocol guarantees in the face of compromising adversaries
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Introduction to modern cryptography.
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
- On Forward Secrecy in One-Round Key Exchange
- One-round key exchange in the standard model
- Public Key Cryptography - PKC 2006
- Public Key Cryptography - PKC 2006
- Stronger Security of Authenticated Key Exchange
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Cited in
(13)- Short variable length domain extenders with beyond birthday bound security
- On optimal tightness for key exchange with full forward secrecy via key confirmation
- Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- One-round identity-based key exchange with perfect forward security
- \textsf{TOPAS} 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Strengthening the security of authenticated key exchange against bad randomness
- State separation for code-based game-playing proofs
- One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
- Strongly secure one round authenticated key exchange protocol with perfect forward security
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
This page was built for publication: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q488261)