An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

被引:0
|
作者
Moriyama, Daisuke [1 ]
Okamoto, Tatsuaki [2 ]
机构
[1] Inst Informat Secur, Kanagawa Ku, 2-14-1 Tsuruya Cho, Yokohama, Kanagawa 2210835, Japan
[2] Nippon Telegraph & Tel Corp, Musashino, Tokyo 180, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia. Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).
引用
收藏
页码:154 / +
页数:3
相关论文
共 50 条
  • [21] A New Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Ma, Chuangui
    Hu, Xuexian
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 135 - 144
  • [22] Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (09) : 1141 - 1163
  • [23] Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 35 - 65
  • [24] A New Efficient and Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Han, Guangguo
    Ma, Chuangui
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 499 - 502
  • [25] Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06) : 1335 - 1344
  • [26] Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles
    Yoneyama, Kazuki
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 518 - 523
  • [27] Strongly Secure Authenticated Key Exchange without NAXOS' Approach
    Kim, Minkyu
    Fujioka, Atsushi
    Ustaoglu, Berkant
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 174 - +
  • [28] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [29] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [30] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +