Strong authenticated key exchange with auxiliary inputs
From MaRDI portal
Publication:2402976
DOI10.1007/s10623-016-0295-3zbMath1381.94065OpenAlexW2547497046MaRDI QIDQ2402976
Guomin Yang, Yi Mu, Rongmao Chen, Fuchun Guo, Willy Susilo
Publication date: 15 September 2017
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-016-0295-3
authenticated key exchangeauxiliary inputsmooth projective hash functionsstrong randomness extractortwisted pseudo-random function
Related Items
Standard model leakage-resilient authenticated key exchange using inner-product extractors, A note on the strong authenticated key exchange with auxiliary inputs, Public-key encryption scheme with optimal continuous leakage resilience, Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing, New approach to practical leakage-resilient public-key cryptography, Novel generic construction of leakage-resilient PKE scheme with CCA security, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Public key encryption with equality test via hash proof system, Strongly leakage resilient authenticated key exchange, revisited
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Smooth projective hashing and two-message oblivious transfer
- Fully leakage-resilient signatures
- Leakage-Tolerant Interactive Protocols
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- After-the-Fact Leakage in Public-Key Encryption
- Round-Optimal Password-Based Authenticated Key Exchange
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-Key Encryption Schemes with Auxiliary Inputs
- Stronger Security of Authenticated Key Exchange
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Signature Schemes with Bounded Leakage Resilience
- Practical Leakage-Resilient Symmetric Cryptography
- Signature Schemes Secure against Hard-to-Invert Leakage
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- On cryptography with auxiliary input
- 2-Pass Key Exchange Protocols from CPA-Secure KEM
- Advances in Cryptology - CRYPTO 2003
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography