On the leakage-resilient key exchange
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protoc...
Main Author: | Alawatugoda Janaka |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2017-12-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2016-0003 |
Similar Items
-
New approach to practical leakage-resilient public-key cryptography
by: Chakraborty Suvradip, et al.
Published: (2020-07-01) -
DAGS: Key encapsulation using dyadic GS codes
by: Banegas Gustavo, et al.
Published: (2018-12-01) -
Hash functions from superspecial genus-2 curves using Richelot isogenies
by: Castryck Wouter, et al.
Published: (2020-08-01) -
Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
by: Jui-Di Wu, et al.
Published: (2018-01-01) -
Predicate signatures from pair encodings via dual system proof technique
by: Nandi Mridul, et al.
Published: (2019-10-01)