Tightly-Secure Authenticated Key Exchange, Revisited

被引:23
|
作者
Jager, Tibor [1 ]
Kiltz, Eike [2 ]
Riepel, Doreen [2 ]
Schaege, Sven [2 ]
机构
[1] Berg Univ Wuppertal, Wuppertal, Germany
[2] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Authenticated key exchange; Tightness; Non-committing encryption; Forward security; PROOFS; ENCRYPTION; PARADIGM; STRONGER;
D O I
10.1007/978-3-030-77870-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce new tightly-secure authenticated key exchange (AKE) protocols that are extremely efficient, yet have only a constant security loss and can be instantiated in the random oracle model both from the standard DDH assumption and a subgroup assumption over RSA groups. These protocols can be deployed with optimal parameters, independent of the number of users or sessions, without the need to compensate a security loss with increased parameters and thus decreased computational efficiency. We use the standard "Single-Bit-Guess" AKE security (with forward secrecy and state corruption) requiring all challenge keys to be simultaneously pseudo-random. In contrast, most previous papers on tightly secure AKE protocols (Bader et al., TCC 2015; Gjosteen and Jager, CRYPTO 2018; Liu et al., ASIACRYPT 2020) concentrated on a non-standard "Multi-Bit-Guess" AKE security which is known not to compose tightly with symmetric primitives to build a secure communication channel. Our key technical contribution is a new generic approach to construct tightly-secure AKE protocols based on non-committing key encapsulation mechanisms. The resulting DDH-based protocols are considerably more efficient than all previous constructions.
引用
收藏
页码:117 / 146
页数:30
相关论文
共 50 条
  • [21] Biometrics-Authenticated Key Exchange for Secure Messaging
    Wang, Mei
    He, Kun
    Chen, Jing
    Li, Zengpeng
    Zhao, Wei
    Du, Ruiying
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2618 - 2631
  • [22] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [23] A secure authenticated key exchange protocol for credential services
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 139 - 149
  • [24] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [25] Secure Authenticated Key Exchange Protocol for Credential Services
    Balakrishna, R.
    Rao, U. Rajeswara
    Geethanjali, N.
    DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2009, 29 (03): : 49 - 54
  • [26] A New Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Ma, Chuangui
    Hu, Xuexian
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 135 - 144
  • [27] Authenticated Key Exchange under Bad Randomness, Revisited
    Cui, Hui
    Mudra, Glen
    MATHEMATICS, 2023, 11 (12)
  • [28] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [29] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911
  • [30] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94