Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM

J Bos, L Ducas, E Kiltz, T Lepoint… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

JW Bos, C Costello, M Naehrig… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Lattice-based cryptographic primitives are believed to offer resilience against attacks by
quantum computers. We demonstrate the practicality of post-quantum key exchange by …

Post-quantum TLS without handshake signatures

P Schwabe, D Stebila, T Wiggers - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A simple provably secure key exchange scheme based on the learning with errors problem

J Ding, X Xie, X Lin - Cryptology ePrint Archive, 2012 - eprint.iacr.org
We use the learning with errors (LWE) problem to build a new simple and provably secure
key exchange scheme. The basic idea of the construction can be viewed as certain …

Authenticated key exchange from ideal lattices

J Zhang, Z Zhang, J Ding, M Snook… - Advances in Cryptology …, 2015 - Springer
In this paper, we present a practical and provably secure two-pass authenticated key
exchange protocol over ideal lattices, which is conceptually simple and has similarities to …

Post-quantum wireguard

A Hülsing, KC Ning, P Schwabe… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the
WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security …

IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited

H Jiang, Z Zhang, L Chen, H Wang, Z Ma - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
With the gradual progress of NIST's post-quantum cryptography standardization, the Round-
1 KEM proposals have been posted for public to discuss and evaluate. Among the IND-CCA …

Post-quantum asynchronous deniable key exchange and the signal handshake

J Brendel, R Fiedler, F Günther, C Janson… - … Conference on Public …, 2022 - Springer
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …