Conference paper Open Access

Authenticated Key Distribution: When the Coupon Collector is Your Enemy

Beunardeau, M.; Orche, F.; Maimuţ, D.; Naccache, D.; Rønne, P.; Ryan, P.


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/f5ba42a4-7e41-44ae-a23c-7e4b34cbf22e/35-Authenticated-Key-Distribution.pdf"
      }, 
      "checksum": "md5:f55b4883c6407240111645f9442755a1", 
      "bucket": "f5ba42a4-7e41-44ae-a23c-7e4b34cbf22e", 
      "key": "35-Authenticated-Key-Distribution.pdf", 
      "type": "pdf", 
      "size": 574991
    }
  ], 
  "owners": [
    41483
  ], 
  "doi": "10.5281/zenodo.3952268", 
  "stats": {
    "version_unique_downloads": 26.0, 
    "unique_views": 28.0, 
    "views": 28.0, 
    "version_views": 28.0, 
    "unique_downloads": 26.0, 
    "version_unique_views": 28.0, 
    "volume": 16674739.0, 
    "version_downloads": 29.0, 
    "downloads": 29.0, 
    "version_volume": 16674739.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3952268", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3952267", 
    "bucket": "https://zenodo.org/api/files/f5ba42a4-7e41-44ae-a23c-7e4b34cbf22e", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3952267.svg", 
    "html": "https://zenodo.org/record/3952268", 
    "latest_html": "https://zenodo.org/record/3952268", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3952268.svg", 
    "latest": "https://zenodo.org/api/records/3952268"
  }, 
  "conceptdoi": "10.5281/zenodo.3952267", 
  "created": "2020-07-22T11:28:10.498732+00:00", 
  "updated": "2020-07-22T12:59:23.044630+00:00", 
  "conceptrecid": "3952267", 
  "revision": 2, 
  "id": 3952268, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3952268", 
    "description": "<p>We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material whose size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction, taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions.</p>", 
    "alternate_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.1007/978-3-030-41025-4_1"
      }
    ], 
    "title": "Authenticated Key Distribution: When the Coupon Collector is Your Enemy", 
    "language": "eng", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3952267"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3952268"
          }
        }
      ]
    }, 
    "access_right": "open", 
    "communities": [
      {
        "id": "futuretpm-h2020"
      }
    ], 
    "grants": [
      {
        "code": "779391", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::779391"
        }, 
        "title": "Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module", 
        "acronym": "FutureTPM", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "Symmetric cryptography", 
      "Key exchange protocol", 
      "Authentication", 
      "Provable security", 
      "Post-quantum cryptography"
    ], 
    "publication_date": "2020-07-20", 
    "creators": [
      {
        "affiliation": "Nomadic Labs, Paris, France", 
        "name": "Beunardeau, M."
      }, 
      {
        "affiliation": "PSL Research University", 
        "name": "Orche, F."
      }, 
      {
        "affiliation": "Advanced Technologies Institute, Bucharest, Romania", 
        "name": "Maimu\u0163, D."
      }, 
      {
        "affiliation": "PSL Research University", 
        "name": "Naccache, D."
      }, 
      {
        "affiliation": "University of Luxembourg", 
        "name": "R\u00f8nne, P."
      }, 
      {
        "affiliation": "University of Luxembourg", 
        "name": "Ryan, P."
      }
    ], 
    "meeting": {
      "acronym": "SecITC 2019", 
      "dates": "November 14 - 15, 2019", 
      "place": "Bucharest, Romania", 
      "title": "Innovative Security Solutions for Information Technology and Communication"
    }, 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3952267", 
        "relation": "isVersionOf"
      }
    ]
  }
}
28
29
views
downloads
All versions This version
Views 2828
Downloads 2929
Data volume 16.7 MB16.7 MB
Unique views 2828
Unique downloads 2626

Share

Cite as