Highly Efficient Key Exchange Protocols with Optimal Tightness

被引:26
|
作者
Cohn-Gordon, Katriel
Cremers, Cas [1 ]
Gjosteen, Kristian [2 ]
Jacobsen, Hakon [3 ]
Jager, Tibor [4 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] NTNU Norwegian Univ Sci & Technol, Trondheim, Norway
[3] McMaster Univ, Hamilton, ON, Canada
[4] Paderborn Univ, Paderborn, Germany
基金
欧洲研究理事会;
关键词
SECURITY PROOFS;
D O I
10.1007/978-3-030-26954-8_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, the combination of nearly-tight proofs and efficient protocols enables the first real-world instantiations for which the parameters can be chosen in a theoretically sound manner. Our reductions have only a linear loss in the number of users, implying that our protocols are more efficient than the state of the art when instantiated with theoretically sound parameters. We also prove that our security proofs are optimal: a linear loss in the number of users is unavoidable for our protocols for a large and natural class of reductions.
引用
收藏
页码:767 / 797
页数:31
相关论文
共 50 条
  • [41] ON THE IMPORTANCE OF MEMORY RESOURCES IN THE SECURITY OF KEY EXCHANGE PROTOCOLS
    DAVIDA, G
    DESMEDT, Y
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 11 - 15
  • [42] Authenticated Key Exchange Protocols Based on Factoring Assumption
    Huang, Hai
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
  • [43] Composability of Bellare-Rogaway Key Exchange Protocols
    Brzuska, Christina
    Fischlin, Marc
    Warinschi, Bogdan
    Williams, Stephen C.
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 51 - 61
  • [44] Computational Soundness for Key Exchange Protocols with Symmetric Encryption
    Kuesters, Ralf
    Tuengerthal, Max
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
  • [45] Security of Group Key Exchange Protocols with Different Passwords
    Phan, Raphael C. -W.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
  • [46] Analyzing the security flaws of internet key exchange protocols
    Zhang, Yong
    Feng, Dong-Lei
    Chen, Han-Sheng
    Bai, Ying-Cai
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
  • [47] Automatic Generation of Optimal Quantum Key Distribution Protocols
    Krawec, Walter O.
    Nelson, Michael G.
    Geiss, Eric P.
    PROCEEDINGS OF THE 2017 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'17), 2017, : 1153 - 1160
  • [48] Efficient authenticators with application to key exchange
    Jiang, Shaoquan
    Gong, Guang
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 81 - 91
  • [49] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [50] Formal design of efficient authentication and key agreement protocols
    Jacobson, G
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113