An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

被引:0
|
作者
Moriyama, Daisuke [1 ]
Okamoto, Tatsuaki [2 ]
机构
[1] Inst Informat Secur, Kanagawa Ku, 2-14-1 Tsuruya Cho, Yokohama, Kanagawa 2210835, Japan
[2] Nippon Telegraph & Tel Corp, Musashino, Tokyo 180, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia. Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).
引用
收藏
页码:154 / +
页数:3
相关论文
共 50 条
  • [1] An eCK-secure Authenticated Key Exchange Protocol without Random Oracles
    Moriyama, Daisuke
    Okamoto, Tatsuaki
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (03): : 607 - 625
  • [2] An efficient strongly secure authenticated key exchange protocol without random oracles
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1461 - 1473
  • [3] eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage
    Li, Sujuan
    Zhang, Futai
    COMPUTER JOURNAL, 2022, 65 (08): : 2063 - 2072
  • [4] A practical strongly secure one-round authenticated key exchange protocol without random oracles
    Yang, Zheng
    Yang, Wu
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1118 - 1131
  • [5] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    田海博
    Willy Susilo
    明洋
    王育民
    JournalofComputerScience&Technology, 2008, (05) : 832 - 842
  • [6] A provable secure ID-based explicit authenticated key agreement protocol without random oracles
    Tian, Hai-Bo
    Susilo, Willy
    Ming, Yang
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (05) : 832 - 842
  • [7] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    Hai-Bo Tian
    Willy Susilo
    Yang Ming
    Yu-Min Wang
    Journal of Computer Science and Technology, 2008, 23 : 832 - 842
  • [8] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138
  • [9] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [10] Sender Authenticated Key Agreements without Random Oracles
    Sato, Chifumi
    Okamoto, Takeshi
    Okamoto, Eiji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1787 - 1794