Provably secure authenticated key exchange protocol under the CDH assumption

被引:7
|
作者
Zhao, Jianjie [1 ]
Gu, Dawu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
Cryptography; Authenticated key exchange; Provable security; eCK model; Key confirmation; AGREEMENT PROTOCOL; VALIDATION; HMQV;
D O I
10.1016/j.jss.2010.07.010
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Constructing a secure key exchange protocol is one of the most challenging problems in information security. We propose a provably secure two-round two-party authenticated key exchange (2AKE) protocol based on the well-studied CDH assumption in eCK model to provide the strongest definition of security for key exchange protocol when using the matching session to define the partnership. The underlying hardness assumption (CDH assumption) of our protocol is weaker than these of four other provably secure 2AKE protocols in CK model or eCK model and the computational cost of our protocol is reasonable. We also present a three-round variant of our protocol to realize key conformation. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:2297 / 2304
页数:8
相关论文
共 50 条
  • [1] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [2] Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption
    Wang, Fengjiao
    Zhang, Yuqing
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 124 - 133
  • [3] A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Li, Wenmin
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (03)
  • [4] A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption
    Haiyan SUN
    Qiaoyan WEN
    Wenmin LI
    [J]. Science China(Information Sciences), 2016, 59 (03) : 107 - 122
  • [5] A provably secure smart card-based authenticated group key exchange protocol
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1602 - 1607
  • [6] Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol
    Yin, An-Qi
    Wang, Ding
    Guo, Yuan-Bo
    Chen, Lin
    Tang, Di
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2321 - 2336
  • [7] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    [J]. COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [8] A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
    Daniel, Renu Mary
    Thomas, Anitha
    Rajsingh, Elijah Blessing
    Silas, Salaja
    [J]. INFORMATION AND COMPUTATION, 2023, 294
  • [9] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [10] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001