Compact Authenticated Key Exchange from Bounded CCA-Secure KEM

被引:0
|
作者
Yoneyama, Kazuki [1 ]
机构
[1] NTT Corp, NTT Secure Platform Labs, Musashino, Tokyo 1808585, Japan
关键词
authenticated key exchange; key encapsulation mechanism; bounded CCA; CRYPTOSYSTEM; STRONGER; PROTOCOL;
D O I
10.1587/transfun.E98.A.132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
How to reduce communication complexity is a common important issue to design cryptographic protocols. This paper focuses on authenticated key exchange (AKE). Several AKE schemes have been studied, which satisfy strong security such as exposure-resilience in the standard model (StdM). However, there is a large gap on communication costs between schemes in the StdM and in the random oracle model. In this paper, we show a generic construction that is significantly compact (i.e., small communication cost) and secure in the StdM. We follow an existing generic construction from key encapsulated mechanism (KEM). Our main technique is to use a bounded chosen-ciphertext secure KEM instead of an ordinary chosen-ciphertext secure KEM. The communication cost can be reduced to half by this technique, and we achieve the most compact AKE scheme in the StdM. Moreover, our construction has instantiations under wider classes of hardness assumptions (e.g., subset-sum problems and multi-variate quadratic systems) than existing constructions. This work pioneers the first meaningful application of bounded chosen-ciphertext secure KEM.
引用
收藏
页码:132 / 143
页数:12
相关论文
共 50 条
  • [31] Efficient CCA-secure public-key encryption schemes from RSA-related assumptions
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 176 - +
  • [32] EFFICIENT FULLY CCA-SECURE PREDICATE ENCRYPTIONS FROM PAIR ENCODINGS
    Nandi, Mridul
    Pandit, Tapas
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2022, 16 (01) : 37 - 72
  • [33] Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption
    Faonio, Antonio
    Hofheinz, Dennis
    Russo, Luigi
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 275 - 305
  • [34] CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
    Cui, Yang
    Hanaoka, Goichiro
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 967 - 970
  • [35] Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
    Fujioka, Atsushi
    Suzuki, Koutarou
    Xagawa, Keita
    Yoneyama, Kazuki
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 467 - 484
  • [36] Strongly secure authenticated key exchange from factoring, codes, and lattices
    Fujioka, Atsushi
    Suzuki, Koutarou
    Xagawa, Keita
    Yoneyama, Kazuki
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 76 (03) : 469 - 504
  • [37] Strongly secure authenticated key exchange from factoring, codes, and lattices
    Atsushi Fujioka
    Koutarou Suzuki
    Keita Xagawa
    Kazuki Yoneyama
    Designs, Codes and Cryptography, 2015, 76 : 469 - 504
  • [38] Efficient CCA-Secure PKE from Identity-Based Techniques
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
  • [39] Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption
    Faonio, Antonio
    Russo, Luigi
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 172 - 196
  • [40] Secure authenticated key exchange for WSNs in IoT applications
    Qi, Mingping
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (12): : 13897 - 13910