2016
DOI: 10.1007/978-3-319-47238-6_10
|View full text |Cite
|
Sign up to set email alerts
|

Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…We propose an extension to HMQV (applicable to similar 2-party protocols) which protects against the eKCI attack and which does not destroy the protocol deniability property: for the initiator and subsequently for the responder. We use for that purpose the modified Schnorr identification scheme [19], which is secure even if the ephemeral secrets of parties are compromised. To the best of our knowledge it is the first proposition of this kind for AKE protocols so far.…”
Section: Contribution and Organization Of The Papermentioning
confidence: 99%
See 4 more Smart Citations
“…We propose an extension to HMQV (applicable to similar 2-party protocols) which protects against the eKCI attack and which does not destroy the protocol deniability property: for the initiator and subsequently for the responder. We use for that purpose the modified Schnorr identification scheme [19], which is secure even if the ephemeral secrets of parties are compromised. To the best of our knowledge it is the first proposition of this kind for AKE protocols so far.…”
Section: Contribution and Organization Of The Papermentioning
confidence: 99%
“…The proposition exchanges the cryptographic building blocks, preserving the construction design, but as the original version, it is still eKCI vulnerable. It is an interesting open question how this particular postquantum HMQV construction can be improved, as the modification based on [19] proposed in our paper is also vulnerable to quantum attacks. There are also approaches for a partial leakage of cryptographic material and bad randomness.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations