Forward secure non-interactive key exchange

D Pointcheval, O Sanders�- Security and Cryptography for Networks: 9th�…, 2014 - Springer
… 3.2 Security Model We define the security of a forward-secure non-interactive key exchange
through a game between an … Our security model makes use of the following oracles: …

Non-interactive key exchange

ESV Freire, D Hofheinz, E Kiltz, KG Paterson�- …�and Theory in Public-Key�…, 2013 - Springer
… one shared key should not undermine the security of other shared keys. Naturally, since the
primitive is noninteractive, one cannot hope to obtain any kind of forward security properties. …

[HTML][HTML] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

S Choudhary, A Gupta�- …�Science and Technology, an International Journal, 2022 - Elsevier
… quantum-safe public-key cryptographic primitive … key cryptography. In this paper, we present
HybridPKE, a robust hybrid cryptographic primitive to provide forward secure key exchange

Fully non-interactive onion routing with forward-secrecy

D Catalano, M Di Raimondo, D Fiore…�- …�and Network Security�…, 2011 - Springer
… The Tor protocol incrementally builds the circuit using the telescoping technique and
each new key is established using a Diffie-Hellman (DH) keyexchange [12]. Its specifications …

Identity-based non-interactive key distribution with forward security

R Steinwandt, A Su�rez Corona�- Designs, Codes and Cryptography, 2012 - Springer
… In this paper we introduced the notion of key-evolving identity-based non-interactive key
form of forward security for ID-NIKD schemes—in a spirit similar to forward-secure signature …

Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation

YK Lee, DH Lee�- …�Conference on IT Convergence and Security�…, 2015 - ieeexplore.ieee.org
key. To make it free from limits of the number of updates, we design forward secure non-interactive
key exchange … In our scheme, there is no limits in the number of updates of private key

[PDF][PDF] Swoosh: Practical Lattice-Based Non-Interactive Key Exchange.

P Gajland, B de Kock, M Quaresma…�- IACR Cryptol. ePrint�…, 2023 - core.ac.uk
key exchange with ephemeral keys on both sides for forward secrecy and has been
updated to offer post-quantum security … However, other protocols do make use of the non-interactive

Fully non-interactive onion routing with forward secrecy

D Catalano, M Di Raimondo, D Fiore…�- …�of information security, 2013 - Springer
… Our solution is based on the application of forward secure encryption. We design a forward
secure … on the fixed base for one of the two exponentiations of the DH key exchange. For a …

Towards tight adaptive security of non-interactive key exchange

J Hesse, D Hofheinz, L Kohl, R Langrehr�- Theory of Cryptography: 19th�…, 2021 - Springer
… of security reductions for non-interactive key exchange (NIKE… building blocks (like public-key
encryption, signatures, or zero… forward the first scheme that enjoys compact public keys and …

Universally composable non-interactive key exchange

ESV Freire, J Hesse, D Hofheinz�- Security and Cryptography for Networks�…, 2014 - Springer
… a trivial key registration in which parties simply send their public … of NIKE securely realizes
our non-interactive key exchange … The security model used in our reduction is denoted by …