Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Keywords: Authentication, Key exchange, Elliptic curve isogenies, Quantum-resistant,. One-round communication. 1. Introduction. Advances in quantum computers ...
We show a general framework for constructing password-based authenticated key exchange protocols with optimal round complexity — one message per party, ...
2023. ASIACRYPT. A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange Abstract.
Abstract. We show a general framework for constructing password-based authenticated key-exchange protocols with optimal round complexity — one message per ...
Missing: Quantum- | Show results with:Quantum-
Nov 24, 2020 · To bridge the gap between asymmetric-PAKE and quantum-security, in this paper, we resort to smooth projective hash functions (SPHF) and ...
[5] presented a three-round protocol constructed from a key encapsulation mechanism (KEM) and a signature scheme; each user needs to compute only one signature.
Sep 20, 2022 · In this paper, the authors construct a quantum-safe PAKE protocol, which is a horizontal extension of the password-authenticated key (PAK) ...
Jun 20, 2023 · and post quantum algorithm are used to implement authenticated key exchange. ... According to the basic ... Round-Optimal Password-Based ...
Sep 28, 2020 · This document describes the OPAQUE protocol, a secure asymmetric password-authenticated key exchange (aPAKE) that supports mutual ...
"Round-Optimal Password-Based Authenticated Key Exchange," with Vinod Vaikuntanathan 8th Theory of Cryptography Conference (TCC) 2011. Invited to J.