HMQV: A High-Performance Secure Diffie-Hellman Protocol
From MaRDI portal
Publication:5451048
DOI10.1007/11535218_33zbMath1145.94445OpenAlexW2117455301WikidataQ56475230 ScholiaQ56475230MaRDI QIDQ5451048
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_33
Related Items
A key manipulation attack on some recent isogeny-based key agreement protocols ⋮ Another Look at Tightness ⋮ An efficient authenticated key exchange from random self-reducibility on CSIDH ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Short variable length domain extenders with beyond birthday bound security ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ KHAPE: Asymmetric PAKE from key-hiding key exchange ⋮ Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite ⋮ Decaf: Eliminating Cofactors Through Point Compression ⋮ Improved attacks against key reuse in learning with errors key exchange ⋮ More efficient post-quantum KEMTLS with pre-distributed public keys ⋮ Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode ⋮ Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Blake-Wilson, Johnson \& Menezes protocol revisited ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Methodology for assessing the security of cryptographic protocols ⋮ Strengthening the security of authenticated key exchange against bad randomness ⋮ A new framework for deniable secure key exchange ⋮ On security analysis of an after-the-fact leakage resilient key exchange protocol ⋮ Authenticated Key Exchange and Key Encapsulation in the Standard Model ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) ⋮ Efficient Public-Key Distance Bounding Protocol ⋮ One-Round Attribute-Based Key Exchange in the Multi-party Setting ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol ⋮ FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes ⋮ DSH: Deniable Secret Handshake Framework ⋮ Certificateless public key encryption: a new generic construction and two pairing-free schemes ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Post-quantum anonymous one-sided authenticated key exchange without random oracles ⋮ Anonymity and one-way authentication in key exchange protocols ⋮ Extended KCI attack against two-party key establishment protocols ⋮ Authenticated confidential channel establishment and the security of TLS-DHE ⋮ Lattice-based authenticated key exchange with tight security ⋮ Provably secure three-party password-based authenticated key exchange protocol ⋮ Two-pass authenticated key exchange with explicit authentication and tight security ⋮ One-Round Attribute-Based Key Exchange in the Multi-Party Setting ⋮ CMQV+: an authenticated key exchange protocol from CMQV ⋮ On weaknesses of the HDCP authentication and key exchange protocol and its repair ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ A formal security analysis of the Signal messaging protocol ⋮ State separation for code-based game-playing proofs ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Key Establishment Using Signcryption Techniques ⋮ Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ О криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012 ⋮ A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols ⋮ Certificateless one-pass and two-party authenticated key agreement protocol and its extensions ⋮ Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity ⋮ A simple provably secure AKE from the LWE problem ⋮ Non-Interactive Key Exchange ⋮ Identity-based authenticated key agreement protocol based on Weil pairing ⋮ A Modular Security Analysis of EAP and IEEE 802.11 ⋮ The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model ⋮ A Provably Secure One-Pass Two-Party Key Establishment Protocol ⋮ An efficient and secure two-flow zero-knowledge identification protocol ⋮ Another look at HMQV ⋮ Another look at automated theorem-proving ⋮ Post-Quantum Forward-Secure Onion Routing ⋮ On the Connection Between Signcryption and One-Pass Key Establishment ⋮ Authenticated Key Exchange with Entities from Different Settings and Varied Groups ⋮ Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol ⋮ Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys ⋮ An improved identity-based key agreement protocol and its security proof ⋮ Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ Privacy-preserving authenticated key exchange and the case of IKEv2 ⋮ Towards Denial-of-Service-Resilient Key Agreement Protocols ⋮ Tightly-secure authenticated key exchange, revisited ⋮ Group key exchange protocols from supersingular isogenies ⋮ HMQV ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage ⋮ TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption ⋮ Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security ⋮ Strongly Secure Certificateless Key Agreement ⋮ On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs ⋮ Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique ⋮ On Forward Secrecy in One-Round Key Exchange ⋮ Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols ⋮ Unilaterally-Authenticated Key Exchange ⋮ Universally composable relaxed password authenticated key exchange ⋮ A conference key distribution system ⋮ 0-RTT Key Exchange with Full Forward Secrecy