Towards post-quantum security for signal's X3DH handshake
From MaRDI portal
Publication:832361
DOI10.1007/978-3-030-81652-0_16zbMATH Open1485.94065OpenAlexW3087207567MaRDI QIDQ832361FDOQ832361
Authors: J. Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
Publication date: 25 March 2022
Full work available at URL: http://hdl.handle.net/20.500.11850/441452
Recommendations
- Post-quantum signal key agreement from SIDH
- Post-quantum asynchronous deniable key exchange and the signal handshake
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Constant-round group key exchange from the ring-LWE assumption
Cites Work
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Post-quantum key exchange for the Internet and the open quantum safe project
- New directions in cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Better key sizes (and attacks) for LWE-based encryption
- Secure integration of asymmetric and symmetric encryption schemes
- Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- CSIDH: an efficient post-quantum commutative group action
- A modular analysis of the Fujisaki-Okamoto transformation
- A cryptographic analysis of the TLS 1.3 handshake protocol
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Title not available (Why is that?)
- On the security of TLS-DHE in the standard model
- Lattice cryptography for the internet
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- PRF-ODH: relations, instantiations, and impossibility results
- Understanding and constructing AKE via double-key key encapsulation mechanism
- Key reuse attack on NewHope key exchange protocol
- Post-quantum static-static key agreement using multiple protocol instances
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Improving key mismatch attack on NewHope with fewer queries
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- New techniques for SIDH-based NIKE
- A formal security analysis of the Signal messaging protocol
- Assessment of the key-reuse resilience of NewHope
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- On the security of the TLS protocol: a systematic analysis
- On adaptive attacks against Jao-Urbanik's isogeny-based protocol
- An efficient authenticated key exchange from random self-reducibility on CSIDH
Cited In (9)
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Post-quantum static-static key agreement using multiple protocol instances
- Post-quantum signal key agreement from SIDH
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Implementing and measuring \textsf{KEMTLS}
- CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
- Ring signatures for deniable AKEM: Gandalf's fellowship
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- A more complete analysis of the signal double ratchet algorithm
Uses Software
This page was built for publication: Towards post-quantum security for signal's X3DH handshake
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832361)