Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber
暂无分享,去创建一个
Angel L. Pérez del Pozo | José Ignacio Escribano Pablos | Misael Enrique Marriaga | Maria Isabel Gonzalez Vasco
[1] Dongho Won,et al. A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol , 2011, Inf. Sci..
[2] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[3] Jonathan Katz,et al. Scalable Protocols for Authenticated Group Key Exchange , 2003, CRYPTO.
[4] María Isabel González Vasco,et al. (Password) Authenticated Key Establishment: From 2-Party to Group , 2007, TCC.
[5] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[6] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[7] Kwangjo Kim,et al. Constant-round Dynamic Group Key Exchange from RLWE Assumption , 2020, IACR Cryptol. ePrint Arch..
[8] Adriana Suárez Corona,et al. From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives † , 2019, Entropy.
[9] Dana Dachman-Soled,et al. Constant-Round Group Key Exchange from the Ring-LWE Assumption , 2019, IACR Cryptol. ePrint Arch..
[10] Atsushi Fujioka,et al. One-Round Authenticated Group Key Exchange from Isogenies , 2019, IACR Cryptol. ePrint Arch..
[11] Rainer Steinwandt,et al. Secure group key establishment revisited , 2007, International Journal of Information Security.