A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
Some key agreement protocols leak information about secret keys if dishonest participants use specialized public keys. We formalize these protocols and attacks, and present a generic transformation that can be made to such key agreement protocols to resist such attacks. Simply put, each party generates k different keys, and two parties perform key agreement using all k 2 combinations of their individual keys. We consider this transformation in the context of various post-quantum key agreementdoi:10.1007/978-3-319-72565-9_3 fatcat:z5larb3xcrebtc7pn37wql4ehy