Tightly-Secure Authenticated Key Exchange, Revisited

被引:23
|
作者
Jager, Tibor [1 ]
Kiltz, Eike [2 ]
Riepel, Doreen [2 ]
Schaege, Sven [2 ]
机构
[1] Berg Univ Wuppertal, Wuppertal, Germany
[2] Ruhr Univ Bochum, Bochum, Germany
基金
欧洲研究理事会;
关键词
Authenticated key exchange; Tightness; Non-committing encryption; Forward security; PROOFS; ENCRYPTION; PARADIGM; STRONGER;
D O I
10.1007/978-3-030-77870-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce new tightly-secure authenticated key exchange (AKE) protocols that are extremely efficient, yet have only a constant security loss and can be instantiated in the random oracle model both from the standard DDH assumption and a subgroup assumption over RSA groups. These protocols can be deployed with optimal parameters, independent of the number of users or sessions, without the need to compensate a security loss with increased parameters and thus decreased computational efficiency. We use the standard "Single-Bit-Guess" AKE security (with forward secrecy and state corruption) requiring all challenge keys to be simultaneously pseudo-random. In contrast, most previous papers on tightly secure AKE protocols (Bader et al., TCC 2015; Gjosteen and Jager, CRYPTO 2018; Liu et al., ASIACRYPT 2020) concentrated on a non-standard "Multi-Bit-Guess" AKE security which is known not to compose tightly with symmetric primitives to build a secure communication channel. Our key technical contribution is a new generic approach to construct tightly-secure AKE protocols based on non-committing key encapsulation mechanisms. The resulting DDH-based protocols are considerably more efficient than all previous constructions.
引用
收藏
页码:117 / 146
页数:30
相关论文
共 50 条
  • [31] Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption
    Zhang, Xiao
    Liu, Shengli
    Gu, Dawu
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 453 - 468
  • [32] Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
    Xu, Xiu
    Xue, Haiyang
    Wang, Kunpeng
    Au, Man Ho
    Tian, Song
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 278 - 308
  • [33] Strongly Secure Authenticated Key Exchange without NAXOS' Approach
    Kim, Minkyu
    Fujioka, Atsushi
    Ustaoglu, Berkant
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 174 - +
  • [34] A secure and efficient authenticated key exchange scheme for smart grid
    Xia, Zhe
    Liu, Tao
    Wang, Jingjing
    Chen, Shi
    HELIYON, 2023, 9 (07)
  • [35] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [36] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138
  • [37] Authenticated Key Exchange Protocols Based on Provable Secure Attribute
    Xia, Hui
    Liu, Jie
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
  • [38] Efficient and Secure Authenticated Key Exchange Using Weak Passwords
    Katz, Jonathan
    Ostrovsky, Rafail
    Yung, Moti
    JOURNAL OF THE ACM, 2009, 57 (01)
  • [39] A New Efficient and Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Han, Guangguo
    Ma, Chuangui
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 499 - 502
  • [40] Improved (Almost) Tightly-Secure Structure-Preserving Signatures
    Jutla, Charanjit S.
    Ohkubo, Miyako
    Roy, Arnab
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 123 - 152