A group authenticated key exchange (GAKE) protocol allows a set of parties belonging to a certain designated group to agree upon a common secret key through an insecure communication network. In the last few years, many new cryptographic tools have been specifically designed to thwart attacks from adversaries which may have access to (different kinds of) quantum computation resources. However, few constructions for group key exchange have been put forward. Here, we propose a four-round GAKE which can be proven secure under widely accepted assumptions in the Quantum Random Oracle Model. Specifically, we integrate several primitives from the so-called Kyber suite of post-quantum tools in a (slightly modified) compiler from Abdalla et al. (TCC...
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
End-to-end authenticity in public networks plays a significant role. Namely, without authenticity, t...
A group authenticated key exchange (GAKE) protocol allows a set of parties belonging to a certain de...
Quantum computing poses fascinating challenges for current cryptography, threatening the security of...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
We present the first constant-round, tree-based, group key exchange protocol based on SIDH with loga...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in practice. Its au...
International audiencePassword Authenticated Key Exchange (PAKE) have become a key building block in...
Key exchange protocols, first introduced by Diffie and Hellman in 1976, are one of the most widely-d...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it ...
In 2016, NIST announced an open competition with the goal of finding and standardizing a suitable qu...
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
End-to-end authenticity in public networks plays a significant role. Namely, without authenticity, t...
A group authenticated key exchange (GAKE) protocol allows a set of parties belonging to a certain de...
Quantum computing poses fascinating challenges for current cryptography, threatening the security of...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
We present the first constant-round, tree-based, group key exchange protocol based on SIDH with loga...
5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013; Limoges; France; 4 June 2013...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in practice. Its au...
International audiencePassword Authenticated Key Exchange (PAKE) have become a key building block in...
Key exchange protocols, first introduced by Diffie and Hellman in 1976, are one of the most widely-d...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
Key establishment is a crucial primitive for building secure channels: in a multi-party setting, it ...
In 2016, NIST announced an open competition with the goal of finding and standardizing a suitable qu...
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA ...
We present a generic, yet simple and efficient transformation to obtain a forward secure authenticat...
End-to-end authenticity in public networks plays a significant role. Namely, without authenticity, t...