Highly Efficient Key Exchange Protocols with Optimal Tightness

被引:26
|
作者
Cohn-Gordon, Katriel
Cremers, Cas [1 ]
Gjosteen, Kristian [2 ]
Jacobsen, Hakon [3 ]
Jager, Tibor [4 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] NTNU Norwegian Univ Sci & Technol, Trondheim, Norway
[3] McMaster Univ, Hamilton, ON, Canada
[4] Paderborn Univ, Paderborn, Germany
基金
欧洲研究理事会;
关键词
SECURITY PROOFS;
D O I
10.1007/978-3-030-26954-8_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, the combination of nearly-tight proofs and efficient protocols enables the first real-world instantiations for which the parameters can be chosen in a theoretically sound manner. Our reductions have only a linear loss in the number of users, implying that our protocols are more efficient than the state of the art when instantiated with theoretically sound parameters. We also prove that our security proofs are optimal: a linear loss in the number of users is unavoidable for our protocols for a large and natural class of reductions.
引用
收藏
页码:767 / 797
页数:31
相关论文
共 50 条
  • [21] Key exchange protocols for multiparty communication services
    Chan, CW
    Chang, CC
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 241 - 248
  • [22] SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE
    LIM, CH
    LEE, PJ
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 91 - 96
  • [23] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [24] A complete characterization of a family of key exchange protocols
    Takaaki Mizuki
    Hiroki Shizuya
    Takao Nishizeki
    International Journal of Information Security, 2002, 1 (2) : 131 - 142
  • [25] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [26] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [27] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [28] Efficient two-party password-based key exchange protocols in the UC framework
    Abdalla, Michel
    Catalano, Dario
    Chevalier, Celine
    Pointcheval, David
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 335 - +
  • [29] Two efficient two-factor authenticated key exchange protocols in public wireless LANs
    Juang, Wen-Shenq
    Wu, Jing-Lin
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 33 - 40
  • [30] Optimal protocols and tradeoffs in quantum key distribution
    Renes, JM
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, 2004, 734 : 327 - 330