2022
DOI: 10.1007/s00145-022-09427-1
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 69 publications
0
7
0
Order By: Relevance
“…KEMs abstract mechanisms that generate and send fresh key material encrypted to another party, from which both parties derive a fresh shared key. Some generic constructions of KEM based key exchanges have been proposed in [21,38], and have for instance been expanded into a full alternative to TLS in [57] or as post-quantum sound variants of the Signal X3DH handshake [41]. These key exchanges were specifically designed to not rely on any DH-like operations, and their security instead relies on assumptions on the corresponding KEM constructions, i.e., IND-CCA.…”
Section: Kem Based Key Exchangesmentioning
confidence: 99%
See 1 more Smart Citation
“…KEMs abstract mechanisms that generate and send fresh key material encrypted to another party, from which both parties derive a fresh shared key. Some generic constructions of KEM based key exchanges have been proposed in [21,38], and have for instance been expanded into a full alternative to TLS in [57] or as post-quantum sound variants of the Signal X3DH handshake [41]. These key exchanges were specifically designed to not rely on any DH-like operations, and their security instead relies on assumptions on the corresponding KEM constructions, i.e., IND-CCA.…”
Section: Kem Based Key Exchangesmentioning
confidence: 99%
“…• Third, we use our tool to provide the first mechanized proofs of the post-quantum computational security of 11 security protocols as case studies. These include two KEM-based key exchanges [21,38], a post-quantum variant of Signal's X3DH [41], and two protocols from the IKE standards [23,44] confirming claims in [37].…”
Section: Introductionmentioning
confidence: 99%
“…In this work, 2 we introduce membership privacy, which hides the participants and also the participant who sends a message, and add membership privacy to the Asynchronous Ratcheting Trees (ART) protocol proposed by Cohn-Gordon et al [7]. 3 Basically, the original key update procedure is not mod- 1 As a remark, although basically group-size hiding is not considered in [18], they insisted that it can be hidden by adding dummy group members. 2 Martiny et al [20] analyzed the sealed sender functionality (See Section 2.2) and showed that it can be broken by identifying the sender.…”
Section: Our Contributionmentioning
confidence: 99%
“…In our work, such a deanonymization attack due to quick responses and due to communication-related value such as IP address are out of the scope, and it is not considered. 3 Cohn-Gordon et al [7] introduced an initiator who setups a group and generates initial secret keys of group members. We remark that the initiator does not know secret keys of group members after key updating.…”
Section: Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation