Password-authenticated key exchange from group actions

M Abdalla, T Eisenhofer, E Kiltz, S Kunzweiler… - Annual International …, 2022 - Springer
We present two provably secure password-authenticated key exchange (PAKE) protocols
based on a commutative group action. To date the most important instantiation of isogeny …

SoK: Game-based security models for group key exchange

B Poettering, P Rösler, J Schwenk, D Stebila - Cryptographers' Track at the …, 2021 - Springer
Group key exchange (GKE) protocols let a group of users jointly establish fresh and secure
key material. Many flavors of GKE have been proposed, differentiated by, among others …

An efficient authenticated key exchange from random self-reducibility on CSIDH

T Kawashima, K Takashima, Y Aikawa… - Information Security and …, 2021 - Springer
SIDH and CSIDH are key exchange protocols based on isogenies and conjectured to be
quantum-resistant. Since the protocols are similar to the classical Diffie–Hellman, they are …

Design and Implementation of a Post-Quantum Group Authenticated Key Exchange protocol with the LibOQS library: a comparative performance analysis from Classic …

JIE Pablos, ME Marriaga, ALP del Pozo - IEEE Access, 2022 - ieeexplore.ieee.org
Group authenticated key exchange protocols (GAKE) are cryptographic tools enabling a
group of several users communicating through an insecure channel to securely establish a …

Finite Field Multiplication for Supersingular Isogeny Diffie–Hellman in Post-Quantum Cryptosystems

Y Fazea, F Mohammed, M Alsamman… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
A quantum The computer's operating speed significantly faster than modern computers,
posing a challenge to existing cryptosystems. Post-Quantum Cryptosystems (PQC) is a type …

Post-quantum anonymous one-sided authenticated key exchange without random oracles

R Ishibashi, K Yoneyama - IACR International Conference on Public-Key …, 2022 - Springer
Abstract Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common
session key among multiple parties. Usually, PKI-based AKE schemes are designed to …

Post-quantum variants of ISO/IEC standards: compact chosen ciphertext secure key encapsulation mechanism from isogeny

K Yoneyama - Proceedings of the 5th ACM Workshop on Security …, 2019 - dl.acm.org
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism
(KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum …

Secure post‐quantum group key exchange: Implementing a solution based on Kyber

JI Escribano Pablos, MI González Vasco - IET Communications, 2023 - Wiley Online Library
Quantum computing poses fascinating challenges for current cryptography, threatening the
security of many schemes and protocols widely used today. To adapt to this reality, the US …

Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber

JI Escribano Pablos, MI González Vasco, ME Marriaga… - Mathematics, 2020 - mdpi.com
A group authenticated key exchange (GAKE) protocol allows a set of parties belonging to a
certain designated group to agree upon a common secret key through an insecure …

Quantum Resistance Saber-Based Group Key Exchange Protocol for IoTs

F Samiullah, ML Gan, S Akleylek… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Quantum computing poses a threat on current cryptography methods, prompting initiatives
such as the US National Institute for Standards and Technology (NIST) standardization …