Strongly secure authenticated key exchange from factoring, codes, and lattices

A Fujioka, K Suzuki, K Xagawa… - Designs, Codes and …, 2015 - Springer
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …

Tightly-secure authenticated key exchange, revisited

T Jager, E Kiltz, D Riepel, S Schäge - … on the Theory and Applications of …, 2021 - Springer
We introduce new tightly-secure authenticated key exchange (AKE) protocols that are
extremely efficient, yet have only a constant security loss and can be instantiated in the …

Post-quantum anonymous one-sided authenticated key exchange without random oracles

R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common
session key among multiple parties. Usually, PKI-based AKE schemes are designed to …

Understanding and constructing AKE via double-key key encapsulation mechanism

H Xue, X Lu, B Li, B Liang, J He - … on the Theory and Application of …, 2018 - Springer
Motivated by abstracting the common idea behind several implicitly authenticated key
exchange (AKE) protocols, we introduce a primitive that we call double-key key …

Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes

F Li, J Wang, M Shang, D Zhang, T Li - Entropy, 2023 - mdpi.com
The security of digital signatures depends significantly on the signature key. Therefore, to
reduce the impact of leaked keys upon existing signatures and subsequent ones, a digital …

One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary

K Yoneyama - IEICE Transactions on Fundamentals of Electronics …, 2013 - search.ieice.org
Forward secrecy (FS) is a central security requirement of authenticated key exchange (AKE).
Especially, strong FS (sFS) is desirable because it can guarantee security against a very …

Modular design of role-symmetric authenticated key exchange protocols

Y Xiao, R Zhang, H Ma - International Conference on the Theory and …, 2021 - Springer
Abstract Authenticated Key Exchange (AKE) is an important primitive in applied
cryptography. Previously several strong models of AKE were introduced, eg, CK, CK^++ …

Key exchange method, key exchange system, communication device and storage medium therefore

T Kobayashi, R Yoshida, H Fuji, T Yamamoto… - US Patent …, 2020 - Google Patents
Plurality of users share a common key while permitting dynamic member change and
computational complexity required for key exchange is reduced. The first key generation unit …

Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles

R Ishibashi, K Yoneyama - IEICE Transactions on Fundamentals of …, 2023 - search.ieice.org
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session
key among multiple parties. Usually, PKI-based AKE schemes are designed to guarantee …

A practical strongly secure one‐round authenticated key exchange protocol without random oracles

Z Yang, W Yang - Security and Communication Networks, 2015 - Wiley Online Library
Most recently, a variant of extended Canetti–Krawczyk model called as eCKw is introduced
to provide stronger security than previous eCK models. Namely eCKw models formulate a …