On secure ratcheting with immediate decryption
From MaRDI portal
Publication:6135429
Recommendations
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Beyond security and efficiency: on-demand ratcheting with security awareness
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Ratcheted encryption and key exchange: the security of messaging
- Symmetric asynchronous ratcheted communication with associated data
Cites work
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- scientific article; zbMATH DE number 1418310 (Why is no real title available?)
- A formal security analysis of the Signal messaging protocol
- A more complete analysis of the signal double ratchet algorithm
- A unified and composable take on ratcheting
- Beyond security and efficiency: on-demand ratcheting with security awareness
- Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
- CoCoA: concurrent continuous group key agreement
- Continuous group key agreement with active security
- Determining the core primitive for optimally secure ratcheting
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Hierarchical ID-Based Cryptography
- How to build time-lock encryption
- KEM combiners
- Optimal channel security against fine-grained state compromise: the safety of messaging
- Security analysis and improvements for the IETF MLS standard for group messaging
- Symmetric asynchronous ratcheted communication with associated data
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Towards bidirectional ratcheted key exchange
Cited in
(7)- Beyond security and efficiency: on-demand ratcheting with security awareness
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Symmetric asynchronous ratcheted communication with associated data
- WhatsUpp with sender keys? Analysis, improvements and security proofs
- Towards bidirectional ratcheted key exchange
- Integrating causality in messaging channels
- On active attack detection in messaging with immediate decryption
This page was built for publication: On secure ratcheting with immediate decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135429)