Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions

被引:0
|
作者
Alawatugoda, Janaka [1 ,2 ]
机构
[1] Rabdan Acad, Fac Resilience, Res & Innovat Ctr Div, POB 114646, Abu Dhabi, U Arab Emirates
[2] Griffith Univ, Inst Integrated & Intelligent Syst, Nathan, Qld 4111, Australia
关键词
authenticated key exchange; standard model; eCK model; pairing; weaker assumptions; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; SECURE;
D O I
10.3390/cryptography7010001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages. To capture the malicious behaviors of the adversaries, there have been many efforts to define security models. Amongst them, the extended Canetti-Krawczyk (eCK) security model is considered one of the strongest security models and has been widely adopted. In this paper, we present a simple construction of a pairing-based eCK-secure AKE protocol in the standard model. Our protocol can be instantiated with a suitable signature scheme (i.e., an existentially unforgeable signature scheme against adaptive chosen message attacks). The underlying assumptions of our construction are the decisional bilinear Diffie-Hellman assumption and the existence of a pseudorandom function. Note that the previous eCK-secure protocol constructions either relied on random oracles for their security or used somewhat strong assumptions, such as the existence of strong-pseudorandom functions, target collision-resistant functions, etc., while our protocol construction uses fewer and more-standard assumptions in the standard model. Furthermore, preserving the same security argument, our protocol can be instantiated with any appropriate signature scheme that comes in the future with better efficiency.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Authenticated key exchange protocol with selectable identities
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 226 - 239
  • [22] An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
    Fushan WEI
    Jianfeng MA
    Ruijie ZHANG
    Chuangui MA
    Xuan WANG
    Science China(Information Sciences), 2017, 60 (07) : 130 - 143
  • [23] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 3 - 27
  • [24] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (09) : 1252 - 1269
  • [25] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [26] Provable secure attribute based authenticated key exchange protocols in the standard model
    Wei, Jiang-Hong
    Liu, Wen-Fen
    Hu, Xue-Xian
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (10): : 2397 - 2408
  • [27] A novel client-to-client password-authenticated key exchange protocol using chaotic maps in the standard model
    Zhu, Hong-Feng
    Xia, Yu
    Zhang, Yan
    Journal of Information Hiding and Multimedia Signal Processing, 2015, 6 (05): : 997 - 1008
  • [28] Security analysis of a password authenticated key exchange protocol
    Bao, F
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
  • [29] Dynamic group Diffie-Hellman key exchange under standard assumptions
    Bresson, E
    Chevassut, O
    Pointcheval, D
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 321 - 336
  • [30] Universally composable security authenticated key exchange protocol
    Zhang, Zinan, 1600, Science Press (41):