Post-quantum asynchronous deniable key exchange and the signal handshake
DOI10.1007/978-3-030-97131-1_1zbMath1519.94214OpenAlexW3187030721MaRDI QIDQ6169026
Douglas Stebila, Felix Günther, Rune Fiedler, Christian Janson, Jacqueline Brendel
Publication date: 10 August 2023
Published in: Public-Key Cryptography – PKC 2022 (Search for Journal in Brave)
Full work available at URL: https://eprint.iacr.org/2021/769
asynchronousauthenticated key exchangedeniabilitypost-quantumsignal protocoldesignated verifier signatures
Cryptography (94A60) Signal theory (characterization, reconstruction, filtering, etc.) (94A12) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (5)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Towards post-quantum security for signal's X3DH handshake
- Practical isogeny-based key-exchange with optimal tightness
- One-round key exchange in the standard model
- Ring signatures: Stronger definitions, and constructions without random oracles
- Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives
- Towards bidirectional ratcheted key exchange
- Ratcheted encryption and key exchange: the security of messaging
- CSIDH: an efficient post-quantum commutative group action
- Post-quantum static-static key agreement using multiple protocol instances
- Bonsai trees, or how to delegate a lattice basis
- A cryptographic analysis of the TLS 1.3 handshake protocol
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Generic forward-secure key agreement without signatures
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Stronger security and constructions of multi-designated verifier signatures
- DualRing: generic construction of ring signatures with efficient instantiations
- SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions
- Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- A formal security analysis of the Signal messaging protocol
- On the cryptographic deniability of the Signal protocol
- Short lattice-based one-out-of-many proofs and applications to ring signatures
- Raptor: a practical lattice-based (linkable) ring signature
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Improved Short Lattice Signatures in the Standard Model
- Designated Verifier Proofs and Their Applications
- Lattice Signatures without Trapdoors
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Stronger Security of Authenticated Key Exchange
- Trapdoors for hard lattices and new cryptographic constructions
- Composability and On-Line Deniability of Authentication
- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
- Key agreement protocols and their security analysis
- Non-Interactive Key Exchange
- Secure integration of asymmetric and symmetric encryption schemes
- 2-Pass Key Exchange Protocols from CPA-Secure KEM
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Security in Communication Networks
- Information Security and Cryptology - ICISC 2003
- One-Shot Verifiable Encryption from Lattices
- Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
- On lattices, learning with errors, random linear codes, and cryptography
- Advances in Cryptology - ASIACRYPT 2003
- Post-quantum asynchronous deniable key exchange and the signal handshake
This page was built for publication: Post-quantum asynchronous deniable key exchange and the signal handshake