Modular Security Proofs for Key Agreement Protocols
From MaRDI portal
Publication:5451090
DOI10.1007/11593447_30zbMath1154.94464OpenAlexW1481626015MaRDI QIDQ5451090
Caroline Kudla, Kenneth G. Paterson
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_30
Related Items (25)
Participant attack on three-party quantum key agreement with two-photon entanglement ⋮ Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode ⋮ Blake-Wilson, Johnson \& Menezes protocol revisited ⋮ Provably secure and efficient certificateless authenticated tripartite key agreement protocol ⋮ A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption ⋮ Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement ⋮ Provably secure one-round identity-based authenticated asymmetric group key agreement protocol ⋮ A formal security analysis of the Signal messaging protocol ⋮ An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries ⋮ A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols ⋮ Identity-based authenticated key agreement protocol based on Weil pairing ⋮ The TLS handshake protocol: A modular analysis ⋮ Automating Computational Proofs for Public-Key-Based Key Exchange ⋮ Simulatable certificateless two-party authenticated key agreement protocol ⋮ A Modular Security Analysis of the TLS Handshake Protocol ⋮ A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges ⋮ Nonce-Based Key Agreement Protocol Against Bad Randomness ⋮ The Twin Diffie-Hellman Problem and Applications ⋮ An improved identity-based key agreement protocol and its security proof ⋮ Asymmetric Group Key Agreement ⋮ Доказательство защищенности протокола обмена ключами ⋮ Tightly-secure authenticated key exchange, revisited ⋮ Strongly Secure Certificateless Key Agreement ⋮ Analysis of the SSH Key Exchange Protocol ⋮ The twin Diffie-Hellman problem and applications
This page was built for publication: Modular Security Proofs for Key Agreement Protocols