This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending on the Diffie-Hellman assumption. The basic idea is to use key-evolving schemes (KES), where the long-term keys of the system get updated regularly and irreversibly. Protocols conforming to our model can be highly efficient, since they do not require the resource-intensive modular exponentiations of the Diffie-Hellman protocol. We also introduce a protocol, called FORSAKES, and prove rigorously that it is a forward-secure AKE protocol in our model. FORSAKES is a very efficient protocol, and can be implemented by merely using hash functions
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange...
In this paper we study security definitions for authenticated key exchange (AKE) protocols
Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each othe...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achiev...
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications...
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contr...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange...
Authenticated key exchange (AKE) protocols, such as IKE and SSL/TLS, have been widely used to ensure...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
This work is a review on existing authenticated key exchange (AKE) security models and protocols mai...
Abstract — This paper continues the study of password-based protocols for authenticated key exchange...
Lightweight authenticated key exchange (AKE) protocols based on symmetric-key cryptography are impor...
Abstract. Traditionally, secure one-round key exchange protocols in the PKI setting have either achi...
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange...
In this paper we study security definitions for authenticated key exchange (AKE) protocols
Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each othe...
Key-evolving protocols aim at limiting damages when an attacker obtains full access to the signer's ...
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achiev...
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications...
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contr...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange...
Authenticated key exchange (AKE) protocols, such as IKE and SSL/TLS, have been widely used to ensure...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
This work is a review on existing authenticated key exchange (AKE) security models and protocols mai...
Abstract — This paper continues the study of password-based protocols for authenticated key exchange...
Lightweight authenticated key exchange (AKE) protocols based on symmetric-key cryptography are impor...
Abstract. Traditionally, secure one-round key exchange protocols in the PKI setting have either achi...
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange...
In this paper we study security definitions for authenticated key exchange (AKE) protocols
Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each othe...