Highly Efficient Key Exchange Protocols with Optimal Tightness

被引:26
|
作者
Cohn-Gordon, Katriel
Cremers, Cas [1 ]
Gjosteen, Kristian [2 ]
Jacobsen, Hakon [3 ]
Jager, Tibor [4 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] NTNU Norwegian Univ Sci & Technol, Trondheim, Norway
[3] McMaster Univ, Hamilton, ON, Canada
[4] Paderborn Univ, Paderborn, Germany
基金
欧洲研究理事会;
关键词
SECURITY PROOFS;
D O I
10.1007/978-3-030-26954-8_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, the combination of nearly-tight proofs and efficient protocols enables the first real-world instantiations for which the parameters can be chosen in a theoretically sound manner. Our reductions have only a linear loss in the number of users, implying that our protocols are more efficient than the state of the art when instantiated with theoretically sound parameters. We also prove that our security proofs are optimal: a linear loss in the number of users is unavoidable for our protocols for a large and natural class of reductions.
引用
收藏
页码:767 / 797
页数:31
相关论文
共 50 条
  • [1] On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
    Gellert, Kai
    Gjosteen, Kristian
    Jacobsen, Hakon
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT IV, 2023, 14084 : 297 - 329
  • [2] Practical Isogeny-Based Key-Exchange with Optimal Tightness
    de Kock, Bor
    Gjosteen, Kristian
    Veroni, Mattia
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 451 - 479
  • [3] Efficient key exchange and authentication protocols protecting weak secrets
    Kwon, T
    Song, J
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1998, E81A (01) : 156 - 163
  • [4] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138
  • [5] Efficient three-party key exchange protocols with round efficiency
    Youn, Taek-Young
    Kang, Eun Sook
    Lee, Changhoon
    TELECOMMUNICATION SYSTEMS, 2013, 52 (02) : 1367 - 1376
  • [6] Efficient, DoS-resistant, secure key exchange for Internet protocols
    Aiello, W
    Bellovin, SM
    Blaze, M
    Canetti, R
    Ioannidis, J
    Keromytis, AD
    Reingold, O
    SECURITY PROTOCOLS, 2002, 2467 : 27 - 39
  • [7] Efficient three-party key exchange protocols with round efficiency
    Taek-Young Youn
    Eun Sook Kang
    Changhoon Lee
    Telecommunication Systems, 2013, 52 : 1367 - 1376
  • [8] Efficient authenticated key exchange protocols for wireless body area networks
    Jingwei Liu
    Qian Li
    Rui Yan
    Rong Sun
    EURASIP Journal on Wireless Communications and Networking, 2015
  • [9] Efficient authenticated key exchange protocols for wireless body area networks
    Liu, Jingwei
    Li, Qian
    Yan, Rui
    Sun, Rong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,
  • [10] ON THE STRUCTURE OF SECRET KEY EXCHANGE PROTOCOLS
    BELLARE, M
    COWEN, L
    GOLDWASSER, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 604 - 605