Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose cryptographic parameters in a way that is supported by a security proof, without the need to sacrifice efficiency by compensating the security loss of a reduction with larger parameters. However, for many important cryptographic primitives, including digital signatures and authenticated key exchange (AKE), we are still lacking constructions that are suitable for real-world deployment. We construct the first truly practical signature scheme with tight security in a real-world multi-user setting with adaptive corruptions. The scheme is based on a new way of applying the Fiat-Shamir approach to construct tightly-secure signatures from certain ...
In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman pro...
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) pro...
Abstract. The notion of authenticator, proposed by Bellare et al., is to transform a protocol secure...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Abstract. Security for digital signature schemes is most commonly an-alyzed in an ideal single user ...
We propose the first tight security proof for the ordinary two-message signed Diffie-Hellman key exc...
Authenticated key exchange (AKE) protocols, such as IKE and SSL/TLS, have been widely used to ensure...
We propose a generic construction of 2-pass authenticated key exchange (AKE) scheme with explicit au...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
Abstract This paper presents an improved password-based authenticated key exchange protocols inthe c...
We present a related family of authentication and digital signature protocols based on symmetric cry...
In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman pro...
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) pro...
Abstract. The notion of authenticator, proposed by Bellare et al., is to transform a protocol secure...
Tight security is increasingly gaining importance in real-world cryptography, as it allows to choose...
Abstract. Security for digital signature schemes is most commonly an-alyzed in an ideal single user ...
We propose the first tight security proof for the ordinary two-message signed Diffie-Hellman key exc...
Authenticated key exchange (AKE) protocols, such as IKE and SSL/TLS, have been widely used to ensure...
We propose a generic construction of 2-pass authenticated key exchange (AKE) scheme with explicit au...
We provide two contributions to exact security analysis of digital signatures: We put forward a new ...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
We carry out a concrete security analysis of signature schemes obtained from five-move identificatio...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based ...
Abstract This paper presents an improved password-based authenticated key exchange protocols inthe c...
We present a related family of authentication and digital signature protocols based on symmetric cry...
In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman pro...
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) pro...
Abstract. The notion of authenticator, proposed by Bellare et al., is to transform a protocol secure...