Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS

From MaRDI portal
Publication:1008987

DOI10.1007/s10623-007-9159-1zbMath1178.94205OpenAlexW2037090944MaRDI QIDQ1008987

Berkant Ustaoglu

Publication date: 31 March 2009

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/11147/4768



Related Items

Another Look at Tightness, Towards post-quantum security for signal's X3DH handshake, A strongly secure identity-based authenticated group key exchange protocol, Improved attacks against key reuse in learning with errors key exchange, Strengthening the security of authenticated key exchange against bad randomness, On the leakage-resilient key exchange, Authenticated Key Exchange and Key Encapsulation in the Standard Model, Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\), A secure and efficient on-line/off-line group key distribution protocol, Efficient Public-Key Distance Bounding Protocol, Provably secure three-party password-based authenticated key exchange protocol, CMQV+: an authenticated key exchange protocol from CMQV, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, A simple provably secure AKE from the LWE problem, Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys, Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols, Towards Denial-of-Service-Resilient Key Agreement Protocols, NAXOS, Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage, TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption, Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security, Strongly Secure Certificateless Key Agreement, Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique, On Forward Secrecy in One-Round Key Exchange, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols, Leaky Random Oracle (Extended Abstract), A conference key distribution system


Uses Software


Cites Work