2-pass key exchange protocols from CPA-secure KEM
From MaRDI portal
Publication:5404763
DOI10.1007/978-3-319-04852-9_20zbMATH Open1337.94046OpenAlexW942788655MaRDI QIDQ5404763FDOQ5404763
Authors: Kaoru Kurosawa, Jun Furukawa Edit this on Wikidata
Publication date: 28 March 2014
Published in: Topics in Cryptology – CT-RSA 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-04852-9_20
Recommendations
- Strongly secure key exchange protocol with minimal KEM
- Two-pass authenticated key exchange with explicit authentication and tight security
- Two-message key exchange with strong security from ideal lattices
- One-round key exchange in the standard model
- Strongly secure one round authenticated key exchange protocol with perfect forward security
Cited In (10)
- Revocable hierarchical identity-based authenticated key exchange
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Multi-cast key distribution: scalable, dynamic and provably secure construction
- Strong authenticated key exchange with auxiliary inputs
- Strongly secure key exchange protocol with minimal KEM
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Secure Cross-Realm C2C-PAKE Protocol
- Two-pass authenticated key exchange with explicit authentication and tight security
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
This page was built for publication: 2-pass key exchange protocols from CPA-secure KEM
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404763)