Compact Authenticated Key Exchange from Bounded CCA-Secure KEM

被引:0
|
作者
Yoneyama, Kazuki [1 ]
机构
[1] NTT Corp, NTT Secure Platform Labs, Musashino, Tokyo 1808585, Japan
关键词
authenticated key exchange; key encapsulation mechanism; bounded CCA; CRYPTOSYSTEM; STRONGER; PROTOCOL;
D O I
10.1587/transfun.E98.A.132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
How to reduce communication complexity is a common important issue to design cryptographic protocols. This paper focuses on authenticated key exchange (AKE). Several AKE schemes have been studied, which satisfy strong security such as exposure-resilience in the standard model (StdM). However, there is a large gap on communication costs between schemes in the StdM and in the random oracle model. In this paper, we show a generic construction that is significantly compact (i.e., small communication cost) and secure in the StdM. We follow an existing generic construction from key encapsulated mechanism (KEM). Our main technique is to use a bounded chosen-ciphertext secure KEM instead of an ordinary chosen-ciphertext secure KEM. The communication cost can be reduced to half by this technique, and we achieve the most compact AKE scheme in the StdM. Moreover, our construction has instantiations under wider classes of hardness assumptions (e.g., subset-sum problems and multi-variate quadratic systems) than existing constructions. This work pioneers the first meaningful application of bounded chosen-ciphertext secure KEM.
引用
收藏
页码:132 / 143
页数:12
相关论文
共 50 条
  • [21] Strongly Secure Key Exchange Protocol with Minimal KEM
    Tian, Baoping
    Wei, Fushan
    Ma, Chuangui
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 139 - 153
  • [22] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [23] IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper)
    Xue, Haiyang
    Li, Bao
    Lu, Xianhui
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 231 - 241
  • [24] RCCA security for KEM plus DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions
    Chen Yuan
    Dong Qingkuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1219 - 1231
  • [25] Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
    Xu, Xiu
    Xue, Haiyang
    Wang, Kunpeng
    Au, Man Ho
    Tian, Song
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 278 - 308
  • [26] IB-KEM Based Password Authenticated Key Exchange Protocol
    Yang, Junhan
    Su, Bo
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 358 - 363
  • [27] CCA-secure publicly verifiable public key encryption scheme without pairings
    Liu, Zhen
    Yang, Xiaoyuan
    Pan, Feng
    Wei, Yuechuan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 74 - 82
  • [28] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [29] Tightly-Secure Authenticated Key Exchange
    Bader, Christoph
    Hofheinz, Dennis
    Jager, Tibor
    Kiltz, Eike
    Li, Yong
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 629 - 658
  • [30] Compact Password Authenticated Key Exchange from Group Actions
    Ishibashi, Ren
    Yoneyama, Kazuki
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 220 - 247