Tightly-Secure Authenticated Key Exchange, Revisited

被引:23
|
作者
Jager, Tibor [1 ]
Kiltz, Eike [2 ]
Riepel, Doreen [2 ]
Schaege, Sven [2 ]
机构
[1] Berg Univ Wuppertal, Wuppertal, Germany
[2] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Authenticated key exchange; Tightness; Non-committing encryption; Forward security; PROOFS; ENCRYPTION; PARADIGM; STRONGER;
D O I
10.1007/978-3-030-77870-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce new tightly-secure authenticated key exchange (AKE) protocols that are extremely efficient, yet have only a constant security loss and can be instantiated in the random oracle model both from the standard DDH assumption and a subgroup assumption over RSA groups. These protocols can be deployed with optimal parameters, independent of the number of users or sessions, without the need to compensate a security loss with increased parameters and thus decreased computational efficiency. We use the standard "Single-Bit-Guess" AKE security (with forward secrecy and state corruption) requiring all challenge keys to be simultaneously pseudo-random. In contrast, most previous papers on tightly secure AKE protocols (Bader et al., TCC 2015; Gjosteen and Jager, CRYPTO 2018; Liu et al., ASIACRYPT 2020) concentrated on a non-standard "Multi-Bit-Guess" AKE security which is known not to compose tightly with symmetric primitives to build a secure communication channel. Our key technical contribution is a new generic approach to construct tightly-secure AKE protocols based on non-committing key encapsulation mechanisms. The resulting DDH-based protocols are considerably more efficient than all previous constructions.
引用
收藏
页码:117 / 146
页数:30
相关论文
共 50 条
  • [1] Tightly-Secure Authenticated Key Exchange
    Bader, Christoph
    Hofheinz, Dennis
    Jager, Tibor
    Kiltz, Eike
    Li, Yong
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 629 - 658
  • [2] Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
    Gjosteen, Kristian
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 95 - 125
  • [3] Tightly-Secure Group Key Exchange with Perfect Forward Secrecy
    Di Giandomenico, Emanuele
    Riepel, Doreen
    Schage, Sven
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V, 2025, 15488 : 134 - 167
  • [4] Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem
    Zeng, Runzhi
    Wang, Libin
    IET INFORMATION SECURITY, 2020, 14 (06) : 764 - 772
  • [5] Tightly Secure ID-based Authenticated Key Exchange
    Mita, Takumu
    Yoneyama, Kazuki
    PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 42 - 53
  • [6] A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT VIII, 2023, 14445 : 143 - 175
  • [7] Tightly-Secure PAK(E)
    Becerra, Jose
    Iovino, Vincenzo
    Ostrev, Dimiter
    Sala, Petra
    Skrobot, Marjan
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 27 - 48
  • [8] Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model
    Xiao, Yuting
    Zhang, Rui
    Ma, Hui
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 171 - 198
  • [9] On Tightly-Secure (Linkable) Ring Signatures
    Tang, Guofeng
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 375 - 393
  • [10] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8