… As an application, we show how to construct an efficient non-interactive receipt-free universally … Besides, our primitive also yields an efficient roundoptimal blind signature scheme based …
R Canetti, J Herzog - Theory of Cryptography: Third Theory of …, 2006 - Springer
… some prominent key-exchange protocols are UC-secure. … states and thus lends to more effective mechanical analysis. … that defines simple protocols, we express in this language …
… ) effective group actions as formalized by Alamati et al. in [ADMP20]. Thus, we will denote an effective … r yields c , where we parameterize the language over the public key. These ideas …
… Finally, we propose very efficient constructions of password … of a LAKE (Language Authenticated KeyExchange) [BBC… Since in this paper, we are not interested in UC-secure schemes, …
Z Li, D Wang - IEEE transactions on services computing, 2019 - ieeexplore.ieee.org
… SPHF, we design an efficient one-round PAKE protocol over … to distinguish a random element in language L from a random … Lattices We can also achieve UC-secure one-round PAKE …
M Campanelli, R Gennaro, K Melissaris… - … Conference on Financial …, 2023 - Springer
… to provide our security and efficiency guarantees. Concretely we … -authentication is language-authenticatedkeyexchange (… 3 is provably UC-secure when the parties are given …
C Jutla, A Roy - International Workshop on Public Key Cryptography, 2012 - Springer
… more efficient. We also show a new single round UC-secure password-based keyexchange … to implement, as we demonstrate later for a particularly important language, where we also …
… to the most efficient oneround PAKE UC-secure against static … PAKE, for Password-Authenticated KeyExchange. The most … efficient instantiations of one-round Language-Authenticated …
… We propose an alternative route to fully automated and efficient security … language by casting several known protocols in that … ) The messages of our model are elements of an algebra A. …