The Twin Diffie-Hellman Problem and Applications

From MaRDI portal
Publication:5458589

DOI10.1007/978-3-540-78967-3_8zbMath1149.94307OpenAlexW2161850389WikidataQ59163753 ScholiaQ59163753MaRDI QIDQ5458589

Victor Shoup, Eike Kiltz, David Cash

Publication date: 15 April 2008

Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_8




Related Items

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilitySigned Diffie-Hellman key exchange with tight securityCryptography from Learning Parity with NoiseAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableUniversally composable anonymous hash certification modelChosen ciphertext secure keyed-homomorphic public-key cryptosystemsA strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumptionIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionEKE meets tight security in the universally composable frameworkAdaptive multiparty NIKEGroup action key encapsulation and non-interactive key exchange in the QROMCompact and tightly selective-opening secure public-key encryption schemesA note on non-interactive zero-knowledge from CDHProvably secure three-party password-based authenticated key exchange protocolIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingPractical chosen ciphertext secure encryption from factoringSecure integration of asymmetric and symmetric encryption schemesTwo-pass authenticated key exchange with explicit authentication and tight securityTightly CCA-secure encryption scheme in a multi-user setting with corruptionsTowards tight adaptive security of non-interactive key exchangeCMQV+: an authenticated key exchange protocol from CMQVEncoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeIdentification Schemes from Key Encapsulation MechanismsAll-but-many encryptionNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionNon-Interactive Key ExchangeKey Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedIdentity-based authenticated key agreement protocol based on Weil pairingToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionImproved efficiency of Kiltz07-KEMStrongly secure identity-based authenticated key agreement protocols without bilinear pairingsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysOn Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsPractical Chosen Ciphertext Secure Encryption from FactoringNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreMulti-recipient Public-Key Encryption from Simulators in Security ProofsNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesToward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH AssumptionStrongly Secure Certificateless Key AgreementGroup signatures with user-controlled and sequential linkabilityAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableCharacterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueComparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman ProtocolsA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsSigned (group) Diffie-Hellman key exchange with tight securityQuantifying the security cost of migrating protocols to practiceDynamic decentralized functional encryption



Cites Work