Ring signatures for deniable AKEM: Gandalf's fellowship

P Gajland, J Janneck, E Kiltz - Annual International Cryptology Conference, 2024‏ - Springer
Ring signatures, a cryptographic primitive introduced by Rivest, Shamir and Tauman
(ASIACRYPT 2001), offer signer anonymity within dynamically formed user groups. Recent …

A mechanised cryptographic proof of the WireGuard virtual private network protocol

B Lipp, B Blanchet, K Bhargavan - 2019 IEEE European …, 2019‏ - ieeexplore.ieee.org
WireGuard is a free and open source Virtual Private Network (VPN) that aims to replace
IPsec and OpenVPN. It is based on a new cryptographic protocol derived from the Noise …

Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication

S Paul, P Scheible, F Wiemer - Journal of Computer Security, 2022‏ - journals.sagepub.com
The threat of a cryptographically relevant quantum computer contributes to an increasing
interest in the field of post-quantum cryptography (PQC). Compared to existing research …

On the insider security of MLS

J Alwen, D Jost, M Mularczyk - Annual International Cryptology …, 2022‏ - Springer
Abstract The Messaging Layer Security (MLS) protocol is an open standard for end-to-end
(E2E) secure group messaging being developed by the IETF, poised for deployment to …

X-wing: The hybrid kem you've been looking for

M Barbosa, D Connolly, JD Duarte, A Kaiser… - Cryptology ePrint …, 2024‏ - eprint.iacr.org
X-Wing is a hybrid key-encapsulation mechanism based on X25519 and ML-KEM-768. It is
designed to be the sensible choice for most applications. The concrete choice of X25519 …

Server-aided continuous group key agreement

J Alwen, D Hartmann, E Kiltz, M Mularczyk - Proceedings of the 2022 …, 2022‏ - dl.acm.org
Continuous Group Key Agreement (CGKA)--or Group Ratcheting--lies at the heart of a new
generation of scalable End-to-End secure (E2E) cryptographic multi-party applications. One …

[HTML][HTML] A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs

D Soler, C Dafonte, M Fernández-Veiga, AF Vilas… - Computer Networks, 2024‏ - Elsevier
High-entropy random numbers are an essential part of cryptography, and Quantum Random
Number Generators (QRNG) are an emergent technology that can provide high-quality keys …

{K-Waay}: Fast and Deniable {Post-Quantum}{X3DH} without Ring Signatures

D Collins, L Huguenin-Dumittan, NK Nguyen… - 33rd USENIX Security …, 2024‏ - usenix.org
The Signal protocol and its X3DH key exchange core are regularly used by billions of
people in applications like WhatsApp but are unfortunately not quantum-secure. Thus …

End-to-end encrypted zoom meetings: Proving security and strengthening liveness

Y Dodis, D Jost, B Kesavan, A Marcedone - … International Conference on …, 2023‏ - Springer
Abstract In May 2020, Zoom Video Communications, Inc.(Zoom) announced a multi-step
plan to comprehensively support end-to-end encrypted (E2EE) group video calls and …

Group action key encapsulation and non-interactive key exchange in the QROM

J Duman, D Hartmann, E Kiltz, S Kunzweiler… - … Conference on the …, 2022‏ - Springer
In the context of quantum-resistant cryptography, cryptographic group actions offer an
abstraction of isogeny-based cryptography in the Commutative Supersingular Isogeny Diffie …