April 28, 2023, 1:10 a.m. | Jie Lin, Manfred von Willich, Hoi-Kwong Lo

cs.CR updates on arXiv.org arxiv.org

The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret
exchange (e.g., for key exchange) between two honest parties that need not have
had prior contact, and use intermediaries with whom they each securely share
confidential data. We show the composable security of the DSKE protocol in the
constructive cryptography framework of Maurer. Specifically, we prove the
security (correctness and confidentiality) and robustness of this protocol
against any computationally unbounded adversary, who additionally may have
fully compromised a bounded number …

adversary communication compromised confidential confidentiality correctness cryptography data distributed exchange framework key may protocol prove robustness secret security share symmetric

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Operations Analyst

@ Astranis | San Francisco

Manager - Business continuity Security and Safety.Risk and Compliance

@ MTN | Benin

Cyber Analyst, Digital Forensics Incident Response

@ At-Bay | Canada

Technical Product Manager, AppSec and DevSecOps

@ Penn Interactive | Philadelphia

Experienced Cloud Security Engineer (m/f/d) - Cybersecurity

@ MediaMarktSaturn | Barcelona, ES, 8003