An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
From MaRDI portal
Publication:2135524
DOI10.1007/s00145-022-09427-1zbMath1487.94120OpenAlexW4229053317MaRDI QIDQ2135524
Thomas Prest, Shuichi Katsumata, Kris Kwiatkowski, Keitaro Hashimoto
Publication date: 9 May 2022
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-022-09427-1
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Towards post-quantum security for signal's X3DH handshake
- Practical isogeny-based key-exchange with optimal tightness
- New proofs for NMAC and HMAC: security without collision resistance
- Towards bidirectional ratcheted key exchange
- Ratcheted encryption and key exchange: the security of messaging
- Understanding and constructing AKE via double-key key encapsulation mechanism
- Practical and tightly-secure digital signatures and authenticated key exchange
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- Generic authenticated key exchange in the quantum random oracle model
- Tightly-secure authenticated key exchange, revisited
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- DualRing: generic construction of ring signatures with efficient instantiations
- A unified and composable take on ratcheting
- Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications
- CSI-FiSh: efficient isogeny based signatures through class group computations
- A formal security analysis of the Signal messaging protocol
- On the cryptographic deniability of the Signal protocol
- Two-message key exchange with strong security from ideal lattices
- Short lattice-based one-out-of-many proofs and applications to ring signatures
- Raptor: a practical lattice-based (linkable) ring signature
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Highly efficient key exchange protocols with optimal tightness
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness
- Forward Secure Non-Interactive Key Exchange
- Stronger Security of Authenticated Key Exchange
- Deniable Internet Key Exchange
- Composability and On-Line Deniability of Authentication
- Key agreement protocols and their security analysis
- Non-Interactive Key Exchange
- Benchmarking Post-quantum Cryptography in TLS
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Tightly-Secure Authenticated Key Exchange
- 2-Pass Key Exchange Protocols from CPA-Secure KEM
- Advances in Cryptology - CRYPTO 2003
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- The Twin Diffie-Hellman Problem and Applications
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Public Key Cryptography - PKC 2006
This page was built for publication: An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable