publication . Article . Other literature type . Conference object . Part of book or chapter of book . 2020

Authenticated Key Distribution: When the Coupon Collector is Your Enemy

Marc Beunardeau; Fatima-Ezzahra El Orche; Diana Maimuţ; David Naccache; Peter B. Rønne; Peter Y. A. Ryan;
Open Access English
  • Published: 20 Jul 2020
  • Publisher: Zenodo
  • Country: Luxembourg
We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe ...
arXiv: Computer Science::Cryptography and Security
free text keywords: Symmetric cryptography, Key exchange protocol, Authentication, Provable security, Post-quantum cryptography, : Computer science [C05] [Engineering, computing & technology], : Sciences informatiques [C05] [Ingénierie, informatique & technologie]
Related Organizations
Funded by
EC| FutureTPM
Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module
  • Funder: European Commission (EC)
  • Project Code: 779391
  • Funding stream: H2020 | RIA
Download fromView all 5 versions
Other literature type . 2020
Provider: Datacite
Conference object . 2020
Provider: ZENODO
Any information missing or wrong?Report an Issue