Vis enkel innførsel

dc.contributor.authorCohn-Gordon, Katriel
dc.contributor.authorCremers, Cas
dc.contributor.authorGjøsteen, Kristian
dc.contributor.authorJacobsen, Håkon
dc.contributor.authorJager, Tibor
dc.date.accessioned2020-01-24T10:03:53Z
dc.date.available2020-01-24T10:03:53Z
dc.date.created2019-09-30T11:03:39Z
dc.date.issued2019
dc.identifier.citationLecture Notes in Computer Science (LNCS). 2019, 11694 LNCS 767-797.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2637773
dc.description.abstractIn this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, the combination of nearly tight proofs and efficient protocols enables the first real-world instantiations for which the parameters can be chosen in a theoretically sound manner, i.e., according to the bounds of the reductions. Specifically, our reductions have a security loss which is only linear in the number of users µ and constant in the number of sessions per user `. This is much better than most other key exchange proofs which are typically quadratic in the product µ`. Combined with the simplicity of our protocols, this implies that our protocols are more efficient than the state of the art when soundly instantiated. We also prove that our security proofs are optimal: a linear loss in the number of users is unavoidable for our protocols for a large and natural class of reductions.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleHighly Efficient Key Exchange Protocols with Optimal Tightnessnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber767-797nb_NO
dc.source.volume11694 LNCSnb_NO
dc.source.journalLecture Notes in Computer Science (LNCS)nb_NO
dc.identifier.doi10.1007/978-3-030-26954-8_25
dc.identifier.cristin1731189
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article. Locked until 1.8.2020 due to copyright restrictions. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-26954-8_25nb_NO
cristin.unitcode194,63,15,0
cristin.unitnameInstitutt for matematiske fag
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel