Efficient UC-secure authenticated key-exchange for algebraic languages

F Ben Hamouda, O Blazy, C Chevalier… - … -Key Cryptography–PKC …, 2013 - Springer
… of authenticated key exchange. It is closely related to CAKE and we call it LAKE, for
Language-Authenticated Key-Exchange… (and possibly independent) languages. The definition of …

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

XCTM Cryptis, ENSC Team - blazy.eu
… As an application, we show how to construct an efficient non-interactive receipt-free universally
… Besides, our primitive also yields an efficient roundoptimal blind signature scheme based …

Universally composable symbolic analysis of mutual authentication and key-exchange protocols

R Canetti, J Herzog - Theory of Cryptography: Third Theory of …, 2006 - Springer
… some prominent key-exchange protocols are UC-secure. … states and thus lends to more
effective mechanical analysis. … that defines simple protocols, we express in this language

[PDF][PDF] Tightly-secure authenticated key exchange.

D Riepel - 2023 - doreenriepel.me
… ) effective group actions as formalized by Alamati et al. in [ADMP20]. Thus, we will denote an
effective … r yields c , where we parameterize the language over the public key. These ideas …

Verifier-based password-authenticated key exchange: New models and constructions

F Benhamouda, D Pointcheval - Cryptology ePrint Archive, 2013 - eprint.iacr.org
… Finally, we propose very efficient constructions of password … of a LAKE (Language Authenticated
Key Exchange) [BBC… Since in this paper, we are not interested in UC-secure schemes, …

Achieving one-round password-based authenticated key exchange over lattices

Z Li, D Wang - IEEE transactions on services computing, 2019 - ieeexplore.ieee.org
… SPHF, we design an efficient one-round PAKE protocol over … to distinguish a random element
in language L from a random … Lattices We can also achieve UC-secure one-round PAKE …

Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions

M Campanelli, R Gennaro, K Melissaris… - … Conference on Financial …, 2023 - Springer
… to provide our security and efficiency guarantees. Concretely we … -authentication is
language-authenticated key exchange (… 3 is provably UC-secure when the parties are given …

Relatively-sound NIZKs and password-based key-exchange

C Jutla, A Roy - International Workshop on Public Key Cryptography, 2012 - Springer
… more efficient. We also show a new single round UC-secure password-based key exchange
… to implement, as we demonstrate later for a particularly important language, where we also …

New techniques for SPHFs and efficient one-round PAKE protocols

F Benhamouda, O Blazy, C Chevalier… - Annual Cryptology …, 2013 - Springer
… to the most efficient oneround PAKE UC-secure against static … PAKE, for Password-Authenticated
Key Exchange. The most … efficient instantiations of one-round Language-Authenticated

Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)

R Canetti, J Herzog - Cryptology ePrint Archive, 2004 - eprint.iacr.org
… We propose an alternative route to fully automated and efficient security … language by casting
several known protocols in that … ) The messages of our model are elements of an algebra A. …