Towards post-quantum security for signal's X3DH handshake
From MaRDI portal
(Redirected from Publication:832361)
Recommendations
- Post-quantum signal key agreement from SIDH
- Post-quantum asynchronous deniable key exchange and the signal handshake
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Constant-round group key exchange from the ring-LWE assumption
Cites work
- scientific article; zbMATH DE number 1617924 (Why is no real title available?)
- scientific article; zbMATH DE number 1618043 (Why is no real title available?)
- A cryptographic analysis of the TLS 1.3 handshake protocol
- A formal security analysis of the Signal messaging protocol
- A modular analysis of the Fujisaki-Okamoto transformation
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Assessment of the key-reuse resilience of NewHope
- Better key sizes (and attacks) for LWE-based encryption
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- CSIDH: an efficient post-quantum commutative group action
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- He gives C-sieves on the CSIDH
- Improving key mismatch attack on NewHope with fewer queries
- Key reuse attack on NewHope key exchange protocol
- Lattice cryptography for the internet
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- New directions in cryptography
- New techniques for SIDH-based NIKE
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- On adaptive attacks against Jao-Urbanik's isogeny-based protocol
- On the Security of Supersingular Isogeny Cryptosystems
- On the security of TLS-DHE in the standard model
- On the security of the TLS protocol: a systematic analysis
- PRF-ODH: relations, instantiations, and impossibility results
- Post-quantum key exchange for the Internet and the open quantum safe project
- Post-quantum static-static key agreement using multiple protocol instances
- Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack
- Quantum security analysis of CSIDH
- Secure integration of asymmetric and symmetric encryption schemes
- Secure integration of asymmetric and symmetric encryption schemes
- Stronger Security of Authenticated Key Exchange
- The double ratchet: security notions, proofs, and modularization for the signal protocol
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Understanding and constructing AKE via double-key key encapsulation mechanism
Cited in
(9)- Post-quantum asynchronous deniable key exchange and the signal handshake
- Post-quantum static-static key agreement using multiple protocol instances
- Post-quantum signal key agreement from SIDH
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Implementing and measuring \textsf{KEMTLS}
- CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Ring signatures for deniable AKEM: Gandalf's fellowship
- A more complete analysis of the signal double ratchet algorithm
This page was built for publication: Towards post-quantum security for signal's X3DH handshake
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832361)