Highly Efficient Key Exchange Protocols with Optimal Tightness

被引:26
|
作者
Cohn-Gordon, Katriel
Cremers, Cas [1 ]
Gjosteen, Kristian [2 ]
Jacobsen, Hakon [3 ]
Jager, Tibor [4 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] NTNU Norwegian Univ Sci & Technol, Trondheim, Norway
[3] McMaster Univ, Hamilton, ON, Canada
[4] Paderborn Univ, Paderborn, Germany
基金
欧洲研究理事会;
关键词
SECURITY PROOFS;
D O I
10.1007/978-3-030-26954-8_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, the combination of nearly-tight proofs and efficient protocols enables the first real-world instantiations for which the parameters can be chosen in a theoretically sound manner. Our reductions have only a linear loss in the number of users, implying that our protocols are more efficient than the state of the art when instantiated with theoretically sound parameters. We also prove that our security proofs are optimal: a linear loss in the number of users is unavoidable for our protocols for a large and natural class of reductions.
引用
收藏
页码:767 / 797
页数:31
相关论文
共 50 条
  • [31] Group key exchange protocols withstanding ephemeral-key reveals
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel Luis
    Suarez Corona, Adriana
    IET INFORMATION SECURITY, 2018, 12 (01) : 79 - 86
  • [32] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24
  • [33] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
  • [34] A class of flexible and efficient key management protocols
    Boyd, C
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 2 - 8
  • [35] Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange
    Bellare, Mihir
    Riepel, Doreen
    Tessaro, Stefano
    Zhang, Yizhao
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT II, 2025, 15485 : 326 - 360
  • [36] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
  • [37] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [38] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [39] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
  • [40] Enhanced authentication and key exchange protocols for roaming service
    Zhou, Tao
    Xu, Jing
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 61 - 68