An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

被引:0
|
作者
Moriyama, Daisuke [1 ]
Okamoto, Tatsuaki [2 ]
机构
[1] Inst Informat Secur, Kanagawa Ku, 2-14-1 Tsuruya Cho, Yokohama, Kanagawa 2210835, Japan
[2] Nippon Telegraph & Tel Corp, Musashino, Tokyo 180, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia. Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).
引用
收藏
页码:154 / +
页数:3
相关论文
共 50 条
  • [31] Efficient and secure password-based authenticated key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1269 - 1272
  • [32] An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET
    Park, Youngho
    Rhee, Kyung-Hyune
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 810 - 817
  • [33] Provably secure authenticated key exchange protocol under the CDH assumption
    Zhao, Jianjie
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (11) : 2297 - 2304
  • [34] A Novel Secure Authenticated Key Exchange Protocol for Wireless Sensor Networks
    Barakat, Tamer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 136 - 140
  • [35] id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
    Fujioka, Atsushi
    Hoshino, Fumitaka
    Kobayashi, Tetsutaro
    Suzuki, Koutarou
    Ustaoglu, Berkant
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1139 - 1155
  • [36] A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption
    Daniel, Renu Mary
    Thomas, Anitha
    Rajsingh, Elijah Blessing
    Silas, Salaja
    INFORMATION AND COMPUTATION, 2023, 294
  • [37] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [38] A new efficient optimistic fair exchange protocol without random oracles
    Huang, Qiong
    Yang, Guomin
    Wong, Duncan S.
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (01) : 53 - 63
  • [39] A new efficient optimistic fair exchange protocol without random oracles
    Qiong Huang
    Guomin Yang
    Duncan S. Wong
    Willy Susilo
    International Journal of Information Security, 2012, 11 : 53 - 63
  • [40] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243