0-RTT Key Exchange with Full Forward Secrecy
From MaRDI portal
Publication:5270373
DOI10.1007/978-3-319-56617-7_18zbMath1390.94838OpenAlexW2601396684MaRDI QIDQ5270373
No author found.
Publication date: 23 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56617-7_18
Related Items (19)
Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ Puncturable identity-based and attribute-based encryption from lattices ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Offline Assisted Group Key Exchange ⋮ Puncturable key wrapping and its applications ⋮ Forward-secure public key encryption without key update from proof-of-stake blockchain ⋮ No-directional and backward-leak uni-directional updatable encryption are equivalent ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ Forward secret encrypted RAM: lower bounds and applications ⋮ Offline witness encryption with semi-adaptive security ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange ⋮ Session resumption protocols and efficient forward security for TLS 1.3 0-RTT ⋮ Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC ⋮ Forward secure message franking
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the Security of the TLS Protocol: A Systematic Analysis
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Proving the TLS Handshake Secure (As It Is)
- Lattice Signatures without Trapdoors
- On the Security of TLS-DHE in the Standard Model
- Forward Secure Non-Interactive Key Exchange
- One-Pass HMQV and Asymmetric Key-Wrapping
- Stronger Security of Authenticated Key Exchange
- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
- Efficient One-Round Key Exchange in the Standard Model
- Efficient Lattice (H)IBE in the Standard Model
- Secure integration of asymmetric and symmetric encryption schemes
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- On the Security of the Pre-shared Key Ciphersuites of TLS
- Pairing-Friendly Elliptic Curves of Prime Order
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
This page was built for publication: 0-RTT Key Exchange with Full Forward Secrecy