Non-interactive key exchange
From MaRDI portal
Publication:4916014
DOI10.1007/978-3-642-36362-7_17zbMATH Open1314.94069OpenAlexW199951655WikidataQ59163680 ScholiaQ59163680MaRDI QIDQ4916014FDOQ4916014
Authors: Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_17
Recommendations
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Pairing-Friendly Elliptic Curves of Prime Order
- Automata, Languages and Programming
- Authenticated key exchange secure against dictionary attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Practical Chosen Ciphertext Secure Encryption from Factoring
- The Knowledge Complexity of Interactive Proof Systems
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Title not available (Why is that?)
- Composability and On-Line Deniability of Authentication
- Title not available (Why is that?)
- Provably secure non-interactive key distribution based on pairings
- Signal-flow-based analysis of wireless security protocols
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Designated verifier proofs and their applications
- Stronger security proofs for RSA and Rabin bits.
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Applied Cryptography and Network Security
- The Twin Diffie-Hellman Problem and Applications
- The Group of Signed Quadratic Residues and Applications
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Short signatures from weaker assumptions
- Square-root algorithms for the discrete logarithm problem (a survey)
- Efficient Factoring Based on Partial Information
- Non-interactive key exchange
- Further results on implicit factoring in polynomial time
- Public Key Cryptography - PKC 2006
Cited In (36)
- Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited
- Fine-grained non-interactive key-exchange: constructions and lower bounds
- Identity-based non-interactive key distribution with forward security
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
- Public-Key Encryption with Non-interactive Opening
- On the multi-user security of LWE-based NIKE
- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
- Secure Key Exchange and Sessions without Credentials
- Group action key encapsulation and non-interactive key exchange in the QROM
- On the hardness of the computational ring-LWR problem and its applications
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- New approach to practical leakage-resilient public-key cryptography
- The pre-shared key modes of HPKE
- Non-interactive key exchange
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs
- Cryptographic multilinear maps using pro-\(p\) groups
- Provably secure non-interactive key distribution based on pairings
- Universally Composable Non-Interactive Key Exchange
- Adaptive multiparty NIKE
- Key exchange with tight (full) forward secrecy via key confirmation
- MODRED: a code-based non-interactive key exchange protocol
- Tightly-secure authenticated key exchange, revisited
- On tightly secure non-interactive key exchange
- Bare PAKE: universally composable key exchange from just passwords
- Fine-grained non-interactive key-exchange without idealized assumptions
- Fine-grained non-interactive key exchange, revisited
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Towards tight adaptive security of non-interactive key exchange
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- CSIDH: an efficient post-quantum commutative group action
- NIKE from affine determinant programs
- Dynamic decentralized functional encryption
- Indifferentiability for public key cryptosystems
This page was built for publication: Non-interactive key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4916014)