Главная
Study mode:
on
1
Intro
2
Classical Key Exchange Setting
3
Multi-Homed Servers
4
General Case
5
Motivation for PPAKE
6
Contribution
7
Overview Security Model
8
PPAKE Security Model: Attack Capabilities
9
PPAKE Security Experiment
10
PPAKE Security Guarantees
11
Applicability to other Security Models
12
IPsec with Signature-based Authentication
13
Phase 2
14
PPAKE Security Proof
15
Conclusion
Description:
Learn about privacy-preserving authenticated key exchange (PPAKE) and its application to the Internet Key Exchange version 2 (IKEv2) protocol in this conference talk presented at PKC 2020. Explore the classical key exchange setting, multi-homed servers, and the general case before delving into the motivation for PPAKE. Discover the contributions and overview of the security model, including attack capabilities, security experiment, and guarantees. Examine the applicability to other security models, focusing on IPsec with signature-based authentication. Gain insights into Phase 2 of the protocol and the PPAKE security proof before reaching the conclusion of this informative presentation on cryptographic key exchange protocols.

Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2

TheIACR
Add to list
0:00 / 0:00