TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption

被引:0
|
作者
Pan, Jiaxin [1 ]
Wang, Libin [1 ]
机构
[1] S China Normal Univ, Sch Comp, Guangzhou 510631, Guangdong, Peoples R China
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
Strengthened eCK model; authenticated key exchange; Diffie-Hellman assumption; trapdoor test; AUTHENTICATED KEY EXCHANGE; NAXOS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an authenticated key exchange (AKE) protocol under the computational Diffie-Hellman (CDH) assumption with respect to the strengthened eCK-security (seCK-security) of Sarr et al.. To date, many AKE protocols either are provably secure under a rather strong and non-standard assumption named as the gap Diffie-Hellman (GDH) assumption, or fall to practical attacks on the intermediate result leakage which can be captured by the seCK model. In order to remove the gap assumption and achieve stronger security requirements, we present the TMQV protocol using the twinning technique and the MQV key derivation method. With the help of trapdoor test theorem, TMQV is provably seCK-secure under the standard CDH assumption in the random oracle model. Compared with the related works, TMQV achieves not only stronger security but also higher implementation efficiency with weaker cryptographic assumptions.
引用
收藏
页码:380 / 388
页数:9
相关论文
共 50 条
  • [1] Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
    Kim, Minkyu
    Fujioka, Atsushi
    Ustaoglu, Berkant
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 29 - 39
  • [2] Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption
    Kim, M
    Kim, J
    Kim, K
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 97 - 108
  • [3] A Secure and Efficient Authenticated Diffie-Hellman Protocol
    Sarr, Augustin P.
    Elbaz-Vincent, Philippe
    Bajard, Jean-Claude
    [J]. PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 83 - +
  • [4] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [5] The Kernel Matrix Diffie-Hellman Assumption
    Morillo, Paz
    Rafols, Carla
    Villar, Jorge L.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 729 - 758
  • [6] The Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, T
    Koshiba, T
    Yamamura, A
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 165 - 171
  • [7] Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, Taiichi
    Koshiba, Takeshi
    Yamamura, Akihiro
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (01) : 165 - 171
  • [8] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10
  • [9] A Quantum Diffie-Hellman Protocol
    Subramaniam, Pranav
    Parakh, Abhishek
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 523 - 524
  • [10] Secure bilinear Diffie-Hellman bits
    Galbraith, SD
    Hopkins, HJ
    Shparlinski, IE
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 370 - 378