One-round authenticated group key exchange from isogenies

A Fujioka, K Takashima, K Yoneyama - … QLD, Australia, October 1–4, 2019 …, 2019 - Springer
This paper proposes two one-round authenticated group key exchange protocols from newly
employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle …

Authenticated logarithmic-order supersingular isogeny group key exchange

HB Hougaard, A Miyaji - International Journal of Information Security, 2022 - Springer
We present the first constant-round, tree-based, group key exchange protocol based on
SIDH with logarithmic-order communication and memory complexity, where the only …

Key escrow protocol based on a tripartite authenticated key agreement and threshold cryptography

Z Wang, Z Ma, S Luo, H Gao - IEEE Access, 2019 - ieeexplore.ieee.org
While instant messaging systems bring convenience to people's lives and work, they also
make it easier for malicious users to discuss and plot illegal activities. Therefore …

Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions

L Benz, W Beskorovajnov, S Eilebrecht, R Gröll… - … Conference on Public …, 2024 - Springer
Dual-receiver encryption (DRE) is a special form of public key encryption (PKE) that allows a
sender to encrypt a message for two recipients. Without further properties, the difference …

[PDF][PDF] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks.

VK Sinha, D Anand, FS Alharithi… - Computers, Materials & …, 2022 - cdn.techscience.cn
The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic
method that offers safe communication and permits two diverse parties to consent to a new …

Multi-cast key distribution: scalable, dynamic and provably secure construction

K Yoneyama, R Yoshida, Y Kawahara… - Provable Security: 10th …, 2016 - Springer
In this paper, we propose a two-round dynamic multi-cast key distribution (DMKD) protocol
under the star topology with a central authentication server. Users can share a common …

SIT: supersingular isogeny tree-based group key exchange

HB Hougaard, A Miyaji - 2020 15th Asia Joint Conference on …, 2020 - ieeexplore.ieee.org
We present the first constant-round, tree-based, group key exchange protocol based on
SIDH with logarithmic communication and memory complexity, where the only previous …

An Efficient ID-Based Tripartite key Management Scheme for E-Health Systems

PE Abi-Char - 2024 47th International Conference on …, 2024 - ieeexplore.ieee.org
With the rapid advancement of Mobile Internet (MI) and wireless networks, mobile devices
have become very essential tools for people's daily tasks as they can provide a wide range …

Group key exchange compilers from generic key exchanges

HB Hougaard, A Miyaji - Network and System Security: 15th International …, 2021 - Springer
We propose a group key exchange compiler using any two-party key exchange for which the
shared key space is the subset of a group and whose security reduces to a decisional hard …

Tree-based ring-lwe group key exchanges with logarithmic complexity

HB Hougaard, A Miyaji - … , ICICS 2020, Copenhagen, Denmark, August 24 …, 2020 - Springer
We present the first constant-round, multicast, tree-based Ring-LWE group key exchange
protocol with logarithmic communication and memory complexity. Our protocol achieves …