de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
de
en
Schliessen
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Dokument suchen
Construction and security analysis of 0-RTT Protocols / Kai Gellert, M. Sc. Wuppertal, March 24, 2020
Inhalt
Abstract
Acronyms
Introduction
State of the Art
Advancements to the State of the Art
Related Work
Publication Overview
Outline
Preliminaries
Notation
Provable Security
Cryptographic Building Blocks
Cryptographic Hash Functions
Pseudorandom Generators
Pseudorandom Functions
Symmetric Encryption
Key Encapsulation Mechanisms
Digital Signatures
Complexity Assumptions
The Random Oracle Model
A Modern View on Forward Security
Motivation
The Traditional View
A Protocol without Forward Secrecy
Diffie–Hellman Key Exchange
Forward Security as Generalization
Forward-Secure Encryption
Forward-Secure Signatures
Comparison
Forward Security in a Non-Interactive Setting
Puncturable Encryption
Precomputed Keys
Message Suppression Attacks
Malicious Key Exhaustion
Classifying Forward Security
Dynamics Keys
Categorizing Schemes
Stronger Adversaries
Conclusion and Open Problems
0-RTT Key Exchange Protocols
Bloom Filter Key Encapsulation Mechanisms
Motivation
Bloom Filters and Their Properties
Bloom Filter Key Encapsulation Mechanisms
Simplifying Security of BFKEMs
Bloom Filter Encryption from Identity-based Broadcast Encryption
Building Blocks
Construction
Security against Chosen-Plaintext Adversaries
Security against Chosen-Ciphertext Adversaries
Instantiation and Comparison
Conclusion and Open Problems
Non-Interactive Forward-Secure Single-Pass Circuit Construction
Motivation
Approaches to Single-Pass Circuit Construction
Forward-Secure Single-Pass Circuit Construction
Two-Party Security Goals
N-Party Security Goals
T0RTT
Construction
Security Analysis
Instantiation
Issues and Solutions
Conclusion and Open Problems
0-RTT Session Resumption Protocols
0-RTT Session Resumption with Forward Security
Motivation
0-RTT Session Resumption Protocols and Their Security
Security in the Single-Server Setting
Security in the Multi-Server Setting
Constructing Secure Session Resumption Protocols
Building Blocks
Generic Construction
A PPRF with Short Secret Keys from Strong RSA
Formal Description of the Construction
Security Analysis
Tree-based PPRFs
Tree-based PPRFs
Combining Tree-based PPRFs with Tickets
Efficiency Analysis
Conclusion and Open Problems
TLS 1.3 0-RTT with Absolute Forward Security
Motivation
Hash-based Key Derivation
Multi-Stage Key Exchange
Protocol Composition
Security Analysis
Match Security
MultiStage Security
Conclusion and Open Problems
Conclusion
Bibliography
Glossary of Terms Qualifying Forward Secrecy and Forward Security
Feasibility of Message Suppression Attacks in SP:GreMie15
IBBE with Constant Size Ciphertexts and Secret Keys
Detailed Description of TLS 1.3 Protocol Values