2006
DOI: 10.1007/11745853_27
|View full text |Cite
|
Sign up to set email alerts
|

The Twist-AUgmented Technique for Key Exchange

Abstract: Abstract. Key derivation refers to the process by which an agreed upon large random number, often named master secret, is used to derive keys to encrypt and authenticate data. Practitioners and standardization bodies have usually used the random oracle model to get key material from a Diffie-Hellman key exchange. However, formal proofs in the standard model require randomness extractors to formally extract the entropy of the random master secret into a seed prior to derive other keys. Whereas this is a quite s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 36 publications
(38 citation statements)
references
References 32 publications
0
38
0
Order By: Relevance
“…Another technique consists in using a curve and its twist as suggested in [5]. Given a curve defined by equation (1), one can define the twisted curve of equation…”
Section: Related Workmentioning
confidence: 99%
“…Another technique consists in using a curve and its twist as suggested in [5]. Given a curve defined by equation (1), one can define the twisted curve of equation…”
Section: Related Workmentioning
confidence: 99%
“…In the latter case, one can consider deterministic extractors. Examples of such source-specific extractors in the cryptographic setting include the well-known hard-core schemes for RSA [2,15] and for discrete-log based functions [21,34], and the recent elegant extraction functions specific to some Diffie-Hellman groups in [11,16]. For most of our study we focus on generic extractors, i.e., those that can extract randomness from any source with sufficient min-entropy, and hence require some non-secret salt.…”
Section: Definition 1 a Probability Distribution X Has Min-entropy (mentioning
confidence: 99%
“…Both [5,6] offer interesting perspectives on the use of randomness extractors in practice that complement our work; our HKDF design is well suited for use also in the settings studied by these works. A good discussion of extraction issues in the context of KDFs in the Diffie-Hellman setting can be found in [11] where a dedicated deterministic extractor for specific DH groups is presented. Another such extractor (very different in techniques and applicability) is presented in [16].…”
Section: Introductionmentioning
confidence: 99%
“…Another extractor for elliptic curves over prime fields is proposed by Gürel in the same paper. However, the latter extracts essentially less than half of the bits of the abscissa of P. One more extractor for elliptic curves over prime fields is the TAU technique of Chevassut et al [5]. This technique allows to extract almost all the bits of the abscissa of a point of the union of an elliptic curve and its quadratic twist.…”
mentioning
confidence: 99%