Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
From MaRDI portal
Publication:1008987
DOI10.1007/s10623-007-9159-1zbMath1178.94205OpenAlexW2037090944MaRDI QIDQ1008987
Publication date: 31 March 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11147/4768
Related Items
Another Look at Tightness, Towards post-quantum security for signal's X3DH handshake, A strongly secure identity-based authenticated group key exchange protocol, Improved attacks against key reuse in learning with errors key exchange, Strengthening the security of authenticated key exchange against bad randomness, On the leakage-resilient key exchange, Authenticated Key Exchange and Key Encapsulation in the Standard Model, Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\), A secure and efficient on-line/off-line group key distribution protocol, Efficient Public-Key Distance Bounding Protocol, Provably secure three-party password-based authenticated key exchange protocol, CMQV+: an authenticated key exchange protocol from CMQV, Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, A simple provably secure AKE from the LWE problem, Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys, Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols, Towards Denial-of-Service-Resilient Key Agreement Protocols, NAXOS, Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage, TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption, Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security, Strongly Secure Certificateless Key Agreement, Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique, On Forward Secrecy in One-Round Key Exchange, Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols, Leaky Random Oracle (Extended Abstract), A conference key distribution system
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security arguments for digital signatures and blind signatures
- An efficient protocol for authenticated key agreement
- Stronger Security of Authenticated Key Exchange
- About the Security of MTI/C0 and MQV
- Validation of Elliptic Curve Public Keys
- Advances in Cryptology – CRYPTO 2004
- Another look at HMQV
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Public Key Cryptography - PKC 2006