Tightly-Secure Authenticated Key Exchange

From MaRDI portal
Publication:5261647


DOI10.1007/978-3-662-46494-6_26zbMath1359.94571OpenAlexW2165549155WikidataQ59163663 ScholiaQ59163663MaRDI QIDQ5261647

Christoph Bader, Yong Li, Tibor Jager, Eike Kiltz, Dennis Hofheinz

Publication date: 6 July 2015

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46494-6_26



Related Items

Generic construction for tightly-secure signatures from discrete log, Signed Diffie-Hellman key exchange with tight security, An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Authenticated key exchange and signatures with tight security in the standard model, Tightness subtleties for multi-user PKE notions, Memory lower bounds of reductions revisited, On the concrete security of TLS 1.3 PSK mode, Digital Signatures with Memory-Tight Security in the Multi-challenge Setting, Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\), Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Deniable authentication when signing keys leak, Almost tight multi-user security under adaptive corruptions \& leakages in the standard model, Fuzzy authenticated key exchange with tight security, Lattice-based signatures with tight adaptive corruptions and more, Privacy-preserving authenticated key exchange in the standard model, On optimal tightness for key exchange with full forward secrecy via key confirmation, Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness, Lattice-based authenticated key exchange with tight security, Almost tight multi-user security under adaptive corruptions from LWE in the standard model, On the adaptive security of MACs and PRFs, Two-pass authenticated key exchange with explicit authentication and tight security, Tightly CCA-secure encryption scheme in a multi-user setting with corruptions, Towards tight adaptive security of non-interactive key exchange, A formal security analysis of the Signal messaging protocol, Tight security for the generic construction of identity-based signature (in the multi-instance setting), Generalized public-key cryptography with tight security, Tightly secure ring signatures in the standard model, Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems, Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions, Session resumption protocols and efficient forward security for TLS 1.3 0-RTT, On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments, Tightly secure hierarchical identity-based encryption, Signatures from sequential-OR proofs, Tightly-secure authenticated key exchange, revisited, More efficient digital signatures with tight multi-user security, An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, Signed (group) Diffie-Hellman key exchange with tight security, Tightly secure signature schemes from the LWE and subset sum assumptions, Efficient and tight oblivious transfer from PKE with tight multi-user security, Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols, Short identity-based signatures with tight security from lattices