Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Highly efficient key exchange protocols with optimal tightness - MaRDI portal

Highly efficient key exchange protocols with optimal tightness

From MaRDI portal
Publication:2304946

DOI10.1007/978-3-030-26954-8_25OpenAlexW2968515856MaRDI QIDQ2304946

Håkon Jacobsen, Kristian Gjøsteen, Katriel Cohn-Gordon, Tibor Jager, C. J. F. Cremers

Publication date: 9 March 2020

Full work available at URL: http://hdl.handle.net/11250/2637773




Related Items

Signed Diffie-Hellman key exchange with tight securityAn efficient authenticated key exchange from random self-reducibility on CSIDHPractical isogeny-based key-exchange with optimal tightnessAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableTightness subtleties for multi-user PKE notionsOptimal tightness for chain-based unique signaturesOn the concrete security of TLS 1.3 PSK modeDigital Signatures with Memory-Tight Security in the Multi-challenge SettingMulti-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)Group action key encapsulation and non-interactive key exchange in the QROMOn optimal tightness for key exchange with full forward secrecy via key confirmationKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessCryptographic analysis of the Bluetooth secure connection protocol suiteLattice-based authenticated key exchange with tight securityUnbounded HIBE with tight securityTwo-pass authenticated key exchange with explicit authentication and tight securityA cryptographic analysis of the TLS 1.3 handshake protocolOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsTightly-secure authenticated key exchange, revisitedGroup key exchange protocols from supersingular isogeniesMore efficient digital signatures with tight multi-user securityAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableSigned (group) Diffie-Hellman key exchange with tight securityTighter proofs for the SIGMA and TLS 1.3 key exchange protocols