Puncturable key wrapping and its applications
From MaRDI portal
Publication:6132430
Recommendations
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- 0-RTT key exchange with full forward secrecy
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Cites work
- scientific article; zbMATH DE number 5009203 (Why is no real title available?)
- (R)CCA secure updatable encryption with integrity protection
- 0-RTT key exchange with full forward secrecy
- A Provable-Security Treatment of the Key-Wrap Problem
- A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT
- Adaptive Security of Constrained PRFs
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Constrained pseudorandom functions and their applications
- Constraining pseudorandom functions privately
- Cryptographic extraction and key derivation: the HKDF scheme
- Functional signatures and pseudorandom functions
- Handling adaptive compromise for practical encryption schemes
- How to use indistinguishability obfuscation
- Key rotation for authenticated encryption
- New negative results on differing-inputs obfuscation
- Nonces are noticed: AEAD revisited
- Puncturable key wrapping and its applications
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Symmetric Key Exchange with Full Forward Security and Robust Synchronization
- Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Updatable encryption with post-compromise security
Cited in
(6)- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- A formal treatment of end-to-end encrypted cloud storage
- One-pass HMQV and asymmetric key-wrapping
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Puncturable key wrapping and its applications
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
This page was built for publication: Puncturable key wrapping and its applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132430)