Non-Interactive Key Exchange
From MaRDI portal
Publication:4916014
DOI10.1007/978-3-642-36362-7_17zbMath1314.94069OpenAlexW199951655WikidataQ59163680 ScholiaQ59163680MaRDI QIDQ4916014
Dennis Hofheinz, Kenneth G. Paterson, Eduarda S. V. Freire, Eike Kiltz
Publication date: 19 April 2013
Published in: Public-Key Cryptography – PKC 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_17
Related Items (19)
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ On the hardness of the computational ring-LWR problem and its applications ⋮ Modular Design of Role-Symmetric Authenticated Key Exchange Protocols ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Multiparty non-interactive key exchange and more from isogenies on elliptic curves ⋮ Adaptive multiparty NIKE ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ Fine-grained non-interactive key-exchange: constructions and lower bounds ⋮ Cryptographic multilinear maps using pro-\(p\) groups ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Towards tight adaptive security of non-interactive key exchange ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ Non-Interactive Key Exchange ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Tightly-secure authenticated key exchange, revisited ⋮ An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable ⋮ Indifferentiability for public key cryptosystems ⋮ Dynamic decentralized functional encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Signal-flow-based analysis of wireless security protocols
- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Stronger security proofs for RSA and Rabin bits.
- Further results on implicit factoring in polynomial time
- Provably secure non-interactive key distribution based on pairings
- Designated Verifier Proofs and Their Applications
- Short Signatures from Weaker Assumptions
- The Group of Signed Quadratic Residues and Applications
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Composability and On-Line Deniability of Authentication
- Practical Chosen Ciphertext Secure Encryption from Factoring
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Efficient Factoring Based on Partial Information
- The Knowledge Complexity of Interactive Proof Systems
- New directions in cryptography
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Applied Cryptography and Network Security
- Non-Interactive Key Exchange
- Pairing-Friendly Elliptic Curves of Prime Order
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- The Twin Diffie-Hellman Problem and Applications
- Automata, Languages and Programming
- Public Key Cryptography - PKC 2006
This page was built for publication: Non-Interactive Key Exchange