Vis enkel innførsel

dc.contributor.authorHan, Shuai
dc.contributor.authorJager, Tibor
dc.contributor.authorKiltz, Eike
dc.contributor.authorLiu, Shengli
dc.contributor.authorPan, Jiaxin
dc.contributor.authorRiepel, Doreen
dc.contributor.authorSchäge, Sven
dc.date.accessioned2022-05-05T14:03:03Z
dc.date.available2022-05-05T14:03:03Z
dc.date.created2021-08-26T12:12:25Z
dc.date.issued2021
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2994409
dc.description.abstractWe construct the first authenticated key exchange protocols that achieve tight security in the standard model. Previous works either relied on techniques that seem to inherently require a random oracle, or achieved only “Multi-Bit-Guess” security, which is not known to compose tightly, for instance, to build a secure channel. Our constructions are generic, based on digital signatures and key encapsulation mechanisms (KEMs). The main technical challenges we resolve is to determine suitable KEM security notions which on the one hand are strong enough to yield tight security, but at the same time weak enough to be efficiently instantiable in the standard model, based on standard techniques such as universal hash proof systems. Digital signature schemes with tight multi-user security in presence of adaptive corruptions are a central building block, which is used in all known constructions of tightly-secure AKE with full forward security. We identify a subtle gap in the security proof of the only previously known efficient standard model scheme by Bader et al. (TCC 2015). We develop a new variant, which yields the currently most efficient signature scheme that achieves this strong security notion without random oracles and based on standard hardness assumptions.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleAuthenticated Key Exchange and Signatures with Tight Security in the Standard Modelen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.rights.holderThis is the authors' accepted manuscript to an article published by Springer. Locked until 11/8-2022 due to copyright restrictions.en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doi10.1007/978-3-030-84259-8_23
dc.identifier.cristin1928935
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel