Highly efficient key exchange protocols with optimal tightness
From MaRDI portal
Publication:2304946
DOI10.1007/978-3-030-26954-8_25OpenAlexW2968515856MaRDI QIDQ2304946
Håkon Jacobsen, Kristian Gjøsteen, Katriel Cohn-Gordon, Tibor Jager, C. J. F. Cremers
Publication date: 9 March 2020
Full work available at URL: http://hdl.handle.net/11250/2637773
Related Items
Signed Diffie-Hellman key exchange with tight security ⋮ An efficient authenticated key exchange from random self-reducibility on CSIDH ⋮ Practical isogeny-based key-exchange with optimal tightness ⋮ An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Tightness subtleties for multi-user PKE notions ⋮ Optimal tightness for chain-based unique signatures ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Digital Signatures with Memory-Tight Security in the Multi-challenge Setting ⋮ Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ On optimal tightness for key exchange with full forward secrecy via key confirmation ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Cryptographic analysis of the Bluetooth secure connection protocol suite ⋮ Lattice-based authenticated key exchange with tight security ⋮ Unbounded HIBE with tight security ⋮ Two-pass authenticated key exchange with explicit authentication and tight security ⋮ A cryptographic analysis of the TLS 1.3 handshake protocol ⋮ On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments ⋮ Tightly-secure authenticated key exchange, revisited ⋮ Group key exchange protocols from supersingular isogenies ⋮ More efficient digital signatures with tight multi-user security ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Signed (group) Diffie-Hellman key exchange with tight security ⋮ Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols