Count corruptions, not users: Improved tightness for signatures, encryption and authenticated key exchange
In the multi-user with corruptions (muc) setting there are\(n\ge 1\) users, and the goal is to
prove that, even in the face of an adversary that adaptively corrupts users to expose their …
prove that, even in the face of an adversary that adaptively corrupts users to expose their …
Latke: a framework for constructing identity-binding pakes
J Katz, M Rosenberg - Annual International Cryptology Conference, 2024 - Springer
Motivated by applications to the internet of things (IoT), Cremers, Naor, Paz, and Ronen
(CRYPTO'22) recently considered a setting in which multiple parties share a common …
(CRYPTO'22) recently considered a setting in which multiple parties share a common …
Key exchange with tight (full) forward secrecy via key confirmation
Weak forward secrecy (wFS) of authenticated key exchange (AKE) protocols is a passive
variant of (full) forward secrecy (FS). A natural mechanism to upgrade from wFS to FS is the …
variant of (full) forward secrecy (FS). A natural mechanism to upgrade from wFS to FS is the …
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols
A security proof for a key exchange protocol requires writing down a security definition.
Authors typically have a clear idea of the level of security they aim to achieve, eg, forward …
Authors typically have a clear idea of the level of security they aim to achieve, eg, forward …
Password-authenticated Key Exchange and Applications
K Gjøsteen - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We analyse a two password-authenticated key exchange protocols, a variant of CPace and
a protocol related to the well-known SRP protocol. Our security results are tight. The first …
a protocol related to the well-known SRP protocol. Our security results are tight. The first …
[PDF][PDF] Nearly Tight Diffie-Hellman-Based Key Exchange–A theoretical analysis of practical protocols
E Karlsen Thesen - 2024 - ntnuopen.ntnu.no
In this thesis, we describe and analyze several Diffie-Hellman-based key exchange
protocols, with an emphasis on giving tight security proofs. At the centre of our analysis is a …
protocols, with an emphasis on giving tight security proofs. At the centre of our analysis is a …