Reference : Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/42594
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
English
Beunardeau, Marc mailto [Nomadic Labs, Paris, France]
El Orche, Fatima Ezzahra mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) > ; ENS, CNRS, PSL Research University, Paris, France]
Maimut, Diana mailto [Advanced Technologies Institute, Bucharest, Romania]
Naccache, David mailto [ENS, CNRS, PSL Research University, Paris, France > > > ; SnT, University of Luxembourg]
Roenne, Peter mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ryan, Peter mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
14-Nov-2019
Innovative Security Solutions for Information Technology and Communications
Springer
LNCS volume, (number 12001)
No
International
12th International Conference, SecITC 2019
November 14-15, 2019
Bucharest
Romania
[en] Symmetric cryptography ; key exchange protocol ; authentication ; provable security ; post-quantum cryptography
[en] We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions.
http://hdl.handle.net/10993/42594

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
Authenticated Key Distribution.pdfPublisher postprint561.51 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.