2-pass key exchange protocols from CPA-secure KEM
From MaRDI portal
Publication:5404763
Recommendations
- Strongly secure key exchange protocol with minimal KEM
- Two-pass authenticated key exchange with explicit authentication and tight security
- Two-message key exchange with strong security from ideal lattices
- One-round key exchange in the standard model
- Strongly secure one round authenticated key exchange protocol with perfect forward security
Cited in
(10)- Multi-cast key distribution: scalable, dynamic and provably secure construction
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Secure Cross-Realm C2C-PAKE Protocol
- Strongly secure key exchange protocol with minimal KEM
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Two-pass authenticated key exchange with explicit authentication and tight security
- Strong authenticated key exchange with auxiliary inputs
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Revocable hierarchical identity-based authenticated key exchange
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
This page was built for publication: 2-pass key exchange protocols from CPA-secure KEM
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5404763)