搜索结果: 1-15 共查到“Authenticated Key Exchange”相关记录93条 . 查询时间(0.763 秒)
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Authenticated Key Exchange RLWE key reuse
2019/6/10
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in practice. Its authenticated version, Authenticated Key Exchange (AKE), avoids man-in-the-middle-based attacks by pro...
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Authenticated key agreement Symmetric-key cryptography Perfect forward secrecy
2019/5/9
Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography. In particular, they can provide perfect forward sec...
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Historical Data Authentication Authenticated Key Exchange
2019/5/9
In this paper, we introduce two lightweight historical data based multi-factor authenticated key exchange (HMAKE) protocols in the random oracle model. Our HMAKE protocols use a symmetric secret key, ...
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
hybrid key exchange key exchange hybrids
2018/11/9
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transitio...
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Authenticated key exchange quantum random oracle model NIST
2018/11/8
We propose FO-AKE , a generic construction of two-message authenticated key exchange (AKE) from any passively secure public key encryption (PKE) in the quantum random oracle model (QROM). Whereas prev...
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny
authenticated key exchange key encapsulation mechanism supersingular elliptic curve isogeny
2018/8/21
In this paper, we study the authenticated key exchange (AKE) based on supersingular isogeny problems which are believed to be difficult for quantum computers. We first propose a three-pass AKE based o...
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
one-round authenticated key exchange supersingular isogeny decisional Diffie-Hellman assumption supersingular isogeny gap Diffie-Hellman assumption
2018/8/10
We propose two authenticated key exchange protocols from supersingular isogenies. Our protocols are the first post-quantum one-round Diffie-Hellman type authenticated key exchange ones in the followin...
Efficient KEA-Style Lattice-Based Authenticated Key Exchange
lattice-based cryptography authenticated key exchange post-quantum cryptography
2018/7/19
Lattice-based cryptographic primitives are believed to have the property against attacks by quantum computers. In this work, we present a KEA-style authenticated key exchange protocol based on the rin...
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Tight security digital signatures Fiat-Shamir
2018/6/5
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrif...
Authenticated key exchange for SIDH
supersingular isogeny crypto authenticated key exchange
2018/3/14
We survey authenticated key exchange (AKE) in the context of supersingular isogeny Diffie-Hellman key exchange (SIDH). We discuss different approaches to achieve authenticated key exchange, and survey...
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Authenticated key exchange post-quantum cryptography supersingular isogenies
2018/3/14
We discuss several post-quantum authenticated key exchange protocols based on the supersingular isogeny problem. Leveraging the design of the well-studied schemes by Krawczyk (2003), Boyd et al. (2008...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Consider key agreement by two parties who start out knowing a common secret (which we refer to as “pass-string”, a generalization of “password”), but face two complications: (1) the pass-string may co...
The security models for Authenticated Key Exchange do not consider leakages on pre–computed ephemeral data before their use in sessions. We investigate the consequences of such leakages and point out ...