We introduce new tightly-secure authenticated key exchange (AKE) protocols that are extremely efficient, yet have only a constant security loss and can be instantiated in the …
R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to …
H Xue, X Lu, B Li, B Liang, J He - … on the Theory and Application of …, 2018 - Springer
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key …
F Li, J Wang, M Shang, D Zhang, T Li - Entropy, 2023 - mdpi.com
The security of digital signatures depends significantly on the signature key. Therefore, to reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital …
K Yoneyama - IEICE Transactions on Fundamentals of Electronics …, 2013 - search.ieice.org
Forward secrecy (FS) is a central security requirement of authenticated key exchange (AKE). Especially, strong FS (sFS) is desirable because it can guarantee security against a very …
Y Xiao, R Zhang, H Ma - International Conference on the Theory and …, 2021 - Springer
Abstract Authenticated Key Exchange (AKE) is an important primitive in applied cryptography. Previously several strong models of AKE were introduced, eg, CK, CK^++ …
T Kobayashi, R Yoshida, H Fuji, T Yamamoto… - US Patent …, 2020 - Google Patents
Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key generation unit …
R Ishibashi, K Yoneyama - IEICE Transactions on Fundamentals of …, 2023 - search.ieice.org
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to guarantee …
Z Yang, W Yang - Security and Communication Networks, 2015 - Wiley Online Library
Most recently, a variant of extended Canetti–Krawczyk model called as eCKw is introduced to provide stronger security than previous eCK models. Namely eCKw models formulate a …