Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random Oracles

被引:2
|
作者
Ishibashi, Ren [1 ]
Yoneyama, Kazuki [1 ]
机构
[1] Ibaraki Univ, 4-12-1 Nakanarusawacho, Hitachi, Ibaraki 3168511, Japan
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I | 2021年 / 12726卷
关键词
Authenticated key exchange; Hierarchical ID-based authenticated key exchange; HID-eCK model; Adaptive ID security; IDENTITY-BASED ENCRYPTION; RESILIENT;
D O I
10.1007/978-3-030-78372-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
引用
收藏
页码:3 / 27
页数:25
相关论文
共 50 条
  • [1] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [2] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (09) : 1252 - 1269
  • [3] Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles
    Yoneyama, Kazuki
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 518 - 523
  • [4] Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06) : 1335 - 1344
  • [5] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    田海博
    Willy Susilo
    明洋
    王育民
    JournalofComputerScience&Technology, 2008, (05) : 832 - 842
  • [6] A provable secure ID-based explicit authenticated key agreement protocol without random oracles
    Tian, Hai-Bo
    Susilo, Willy
    Ming, Yang
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (05) : 832 - 842
  • [7] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    Hai-Bo Tian
    Willy Susilo
    Yang Ming
    Yu-Min Wang
    Journal of Computer Science and Technology, 2008, 23 : 832 - 842
  • [8] Tightly Secure ID-based Authenticated Key Exchange
    Mita, Takumu
    Yoneyama, Kazuki
    PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 42 - 53
  • [9] Strongly Secure Revocable ID-based Signature without Random Oracles
    Hung, Ying-Hao
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 264 - 276
  • [10] id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
    Fujioka, Atsushi
    Hoshino, Fumitaka
    Kobayashi, Tetsutaro
    Suzuki, Koutarou
    Ustaoglu, Berkant
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1139 - 1155