A New Strongly Secure Authenticated Key Exchange Protocol

被引:0
|
作者
Cheng, Qingfeng [1 ]
Ma, Chuangui [1 ]
Hu, Xuexian [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Peoples R China
关键词
Extended Canetti-Krawczyk model; Gap Diffie-Hellman assumption; Random oracle model; Authenticated key exchange;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2007, LaMacchia et al. proposed the extended Canetti-Krawczyk (eCK) model, which is currently regarded as the strongest, security model for authenticated key exchange (AKE) protocols. In the eCK model, the adversary can reveal a party's ephemeral private key or static private key on the test session, but can't reveal the ephemeral value which was computed using ephemeral private key and static private key. In this paper, we first present the modified eCK (meCK) model by adding a new reveal query. The adversary can reveal all ephemeral secret information of the test session according to the meCK model's freshness definition. Then we propose a new strongly secure AKE protocol, called E-NAXOS, and prove its security in the meCK model under the random oracle assumption and the gap Diffie-Hellman assumption.
引用
收藏
页码:135 / 144
页数:10
相关论文
共 50 条
  • [1] A New Efficient and Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Han, Guangguo
    Ma, Chuangui
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 499 - 502
  • [2] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [3] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    [J]. COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [4] A strongly secure identity-based authenticated group key exchange protocol
    TENG JiKai
    WU ChuanKun
    TANG ChunMing
    TIAN YouLiang
    [J]. Science China(Information Sciences), 2015, 58 (09) : 98 - 109
  • [5] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [6] An efficient strongly secure authenticated key exchange protocol without random oracles
    Yang, Zheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1461 - 1473
  • [7] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [8] Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
    Huang, Hai
    [J]. PROVABLE SECURITY, 2011, 6980 : 389 - 397
  • [9] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    [J]. Int. Rev. Comput. Softw., 7 (3633-3638):
  • [10] A secure authenticated key exchange protocol for credential services
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 139 - 149