Puncturable key wrapping and its applications
From MaRDI portal
Publication:6132430
DOI10.1007/978-3-031-22966-4_22zbMATH Open1519.94042OpenAlexW4320154922MaRDI QIDQ6132430FDOQ6132430
Authors: Matilda Backendal, Felix Günther, Kenneth G. Paterson
Publication date: 16 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22966-4_22
Recommendations
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- 0-RTT key exchange with full forward secrecy
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Cites Work
- A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- A Provable-Security Treatment of the Key-Wrap Problem
- How to use indistinguishability obfuscation
- Cryptographic extraction and key derivation: the HKDF scheme
- Symmetric Key Exchange with Full Forward Security and Robust Synchronization
- Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy
- Constrained pseudorandom functions and their applications
- Functional signatures and pseudorandom functions
- Constraining pseudorandom functions privately
- Updatable encryption with post-compromise security
- Key rotation for authenticated encryption
- New negative results on differing-inputs obfuscation
- 0-RTT key exchange with full forward secrecy
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Nonces are noticed: AEAD revisited
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
- Adaptive Security of Constrained PRFs
- (R)CCA secure updatable encryption with integrity protection
- Handling adaptive compromise for practical encryption schemes
- Puncturable key wrapping and its applications
Cited In (6)
- Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- One-pass HMQV and asymmetric key-wrapping
- A formal treatment of end-to-end encrypted cloud storage
- Incremental symmetric puncturable encryption with support for unbounded number of punctures
- Puncturable key wrapping and its applications
This page was built for publication: Puncturable key wrapping and its applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132430)