Vis enkel innførsel

dc.contributor.authorPan, Jiaxin
dc.contributor.authorQian, Chen
dc.contributor.authorRingerud, Magnus
dc.date.accessioned2021-10-28T06:36:50Z
dc.date.available2021-10-28T06:36:50Z
dc.date.created2021-07-31T12:25:58Z
dc.date.issued2021
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2826106
dc.description.abstractWe propose the first tight security proof for the ordinary two-message signed Diffie-Hellman key exchange protocol in the random oracle model. Our proof is based on the strong computational Diffie-Hellman assumption and the multi-user security of a digital signature scheme. With our security proof, the signed DH protocol can be deployed with optimal parameters, independent of the number of users or sessions, without the need to compensate any security loss. We abstract our approach with a new notion called verifiable key exchange. In contrast to a known tight three-message variant of the signed Diffie-Hellman protocol (Gjøsteen and Jager, CRYPTO 2018), we do not require any modification to the original protocol, and our tightness result is proven in the “Single-Bit-Guess” model which we known can be tightly composed with symmetric cryptographic primitives to establish a secure channel.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleSigned Diffie-Hellman Key Exchange with Tight Securityen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.rights.holderThis is the authors' accepted manuscript to an article published by Springer.en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doihttps://doi.org/10.1007/978-3-030-75539-3_9
dc.identifier.cristin1923225
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel