TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption

被引:0
|
作者
Pan, Jiaxin [1 ]
Wang, Libin [1 ]
机构
[1] S China Normal Univ, Sch Comp, Guangzhou 510631, Guangdong, Peoples R China
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
Strengthened eCK model; authenticated key exchange; Diffie-Hellman assumption; trapdoor test; AUTHENTICATED KEY EXCHANGE; NAXOS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an authenticated key exchange (AKE) protocol under the computational Diffie-Hellman (CDH) assumption with respect to the strengthened eCK-security (seCK-security) of Sarr et al.. To date, many AKE protocols either are provably secure under a rather strong and non-standard assumption named as the gap Diffie-Hellman (GDH) assumption, or fall to practical attacks on the intermediate result leakage which can be captured by the seCK model. In order to remove the gap assumption and achieve stronger security requirements, we present the TMQV protocol using the twinning technique and the MQV key derivation method. With the help of trapdoor test theorem, TMQV is provably seCK-secure under the standard CDH assumption in the random oracle model. Compared with the related works, TMQV achieves not only stronger security but also higher implementation efficiency with weaker cryptographic assumptions.
引用
收藏
页码:380 / 388
页数:9
相关论文
共 50 条
  • [41] Circular-secure encryption from decision Diffie-Hellman
    Boneh, Dan
    Halevi, Shai
    Hamburg, Mike
    Ostrovsky, Rafail
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 108 - +
  • [42] Chosen-ciphertext secure key-encapsulation based on Gap Hashed Diffie-Hellman
    Kiltz, Eike
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 282 - 297
  • [43] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [44] A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs
    Sun, Fajun
    He, Selena
    Zhang, Xiaotong
    Zhang, Jun
    Li, Qingan
    He, Yanxiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1986 - 1999
  • [45] Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique
    Huang, Hai
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 325 - 343
  • [46] Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance
    Yakovlev, Viktor
    Korzhik, Valery
    Adadurov, Sergey
    [J]. PROCEEDINGS OF THE 2021 29TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), VOL 1, 2021, : 385 - 392
  • [47] A simple deniable authentication protocol based on the Diffie-Hellman algorithm
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Qin, Liuquan
    Liang, Xiaohui
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2008, 85 (09) : 1315 - 1323
  • [48] Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption
    Baek, J
    Lee, B
    Kim, K
    [J]. ETRI JOURNAL, 2000, 22 (04) : 25 - 31
  • [49] Authenticated Diffie-Hellman Key Agreement Protocol with Forward Secrecy
    ZHANG Chuanrong1
    2. State Key Laboratory of Information Security/Graduate University of Chinese Academy of Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 641 - 644
  • [50] Improving the single-assumption authenticated diffie-hellman key agreement Protocols
    Yoon, Eun-Jun
    Lee, Wan-Soo
    Yoo, Kee-Young
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 926 - +