Browsing Mathematics / Matematik by Publisher "International Association for Cryptologic Research"
Now showing items 1-4 of 4
-
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
(International Association for Cryptologic Research, 2009)Both the ``eCK'' model, by LaMacchia, Lauter and Mityagin, and the ``CK01'' model, by Canetti and Krawczyk, address the effect of leaking session specific ephemeral data on the security of key establishment schemes. The ... -
Efficient key exchange with tight security reduction
(International Association for Cryptologic Research, 2009)In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, which have efficient online computation and tight security proof in the extended Canetti-Krawczyk (eCK) model. SMEN takes 1.25 ... -
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (extended version)
(International Association for Cryptologic Research, 2009)LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that ... -
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
(International Association for Cryptologic Research, 2009)We propose an new one-round implicitly authenticated three-party protocol that extends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single communication round that consists of ephemeral ...