Towards post-quantum security for signal's X3DH handshake
From MaRDI portal
Publication:832361
DOI10.1007/978-3-030-81652-0_16zbMath1485.94065OpenAlexW3087207567MaRDI QIDQ832361
Jacqueline Brendel, Douglas Stebila, Felix Günther, Marc Fischlin, Christian Janson
Publication date: 25 March 2022
Full work available at URL: http://hdl.handle.net/20.500.11850/441452
Related Items
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable, A more complete analysis of the signal double ratchet algorithm, Post-quantum signal key agreement from SIDH, Post-quantum asynchronous deniable key exchange and the signal handshake
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- PRF-ODH: relations, instantiations, and impossibility results
- A modular analysis of the Fujisaki-Okamoto transformation
- Post-quantum key exchange for the Internet and the open quantum safe project
- Understanding and constructing AKE via double-key key encapsulation mechanism
- CSIDH: an efficient post-quantum commutative group action
- Key reuse attack on NewHope key exchange protocol
- Post-quantum static-static key agreement using multiple protocol instances
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Secure integration of asymmetric and symmetric encryption schemes
- A cryptographic analysis of the TLS 1.3 handshake protocol
- Improving key mismatch attack on NewHope with fewer queries
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- New techniques for SIDH-based NIKE
- A formal security analysis of the Signal messaging protocol
- Assessment of the key-reuse resilience of NewHope
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- On the Security of the TLS Protocol: A Systematic Analysis
- On the Security of TLS-DHE in the Standard Model
- Lattice Cryptography for the Internet
- On the Security of Supersingular Isogeny Cryptosystems
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Stronger Security of Authenticated Key Exchange
- New directions in cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
- On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman