Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions

被引:0
|
作者
Alawatugoda, Janaka [1 ,2 ]
机构
[1] Rabdan Acad, Fac Resilience, Res & Innovat Ctr Div, POB 114646, Abu Dhabi, U Arab Emirates
[2] Griffith Univ, Inst Integrated & Intelligent Syst, Nathan, Qld 4111, Australia
关键词
authenticated key exchange; standard model; eCK model; pairing; weaker assumptions; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; SECURE;
D O I
10.3390/cryptography7010001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages. To capture the malicious behaviors of the adversaries, there have been many efforts to define security models. Amongst them, the extended Canetti-Krawczyk (eCK) security model is considered one of the strongest security models and has been widely adopted. In this paper, we present a simple construction of a pairing-based eCK-secure AKE protocol in the standard model. Our protocol can be instantiated with a suitable signature scheme (i.e., an existentially unforgeable signature scheme against adaptive chosen message attacks). The underlying assumptions of our construction are the decisional bilinear Diffie-Hellman assumption and the existence of a pseudorandom function. Note that the previous eCK-secure protocol constructions either relied on random oracles for their security or used somewhat strong assumptions, such as the existence of strong-pseudorandom functions, target collision-resistant functions, etc., while our protocol construction uses fewer and more-standard assumptions in the standard model. Furthermore, preserving the same security argument, our protocol can be instantiated with any appropriate signature scheme that comes in the future with better efficiency.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Authenticated Key-Exchange Protocol for Heterogeneous CPS
    Harishma, Boyapally
    Patranabis, Sikhar
    Chatterjee, Urbi
    Mukhopadhyay, Debdeep
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 849 - 851
  • [42] Password Authenticated Key Exchange Protocol with Stronger Security
    Ding Xiao-fei
    Ma Chuan-gui
    Cheng Qing-feng
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 678 - 681
  • [43] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [44] Tripartite authenticated key exchange protocol for smart grid
    Wang S.
    Zhou X.
    Wen K.
    Weng B.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 210 - 218
  • [45] Secure Authenticated Key Exchange Protocol for Credential Services
    Balakrishna, R.
    Rao, U. Rajeswara
    Geethanjali, N.
    DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2009, 29 (03): : 49 - 54
  • [46] A New Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Ma, Chuangui
    Hu, Xuexian
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 135 - 144
  • [47] Authenticated Key Exchange under Bad Randomness
    Yang, Guomin
    Duan, Shanshan
    Wong, Duncan S.
    Tan, Chik How
    Wang, Huaxiong
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2012, 7035 : 113 - +
  • [48] Password authenticated key exchange protocol in electronic vehicle key enviromment
    Ming Y.
    Zou J.
    Shen T.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2021, 47 (04): : 698 - 705
  • [49] Gateway-oriented password-authenticated key exchange protocol in the standard model (vol 85, pg 760, 2012)
    Wei, Fushan
    Zhang, Zhenfeng
    Ma, Chuangui
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (09) : 2192 - 2192
  • [50] A framework for gateway-oriented password-authenticated key exchange in the standard model
    Wei, Fu-Shan
    Zhang, Zhen-Feng
    Ma, Chuan-Gui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09): : 1833 - 1844