Kim, Minkyu and Fujioka, Atsushi and Ustaoğlu, Berkant (2012) Strongly secure authenticated key exchange without NAXOS' approach under computational Diffie-Hellman assumption. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E95A (1). pp. 29-39. ISSN 0916-8508
Full text not available from this repository. (Request a copy)
Official URL: http://dx.doi.org/10.1587/transfun.E95.A.29
Abstract
LaMacchia, Lamer and Mityagin [19] proposed a novel security definition for authenticate key exchange (AKE) that gives an adversary the power to obtain ephemeral information regarding a target test session. To demonstrate feasibility of secure protocols in the new definition, henceforth called eCK, the authors described a protocol called NAXOS. NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X (more precisely in what we call the NAXOS' approach X = g(H(x,a))). Thus no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. This idea is crucial in the security argument to guard against leaked ephemeral secrets belonging to the test session. Another important assumption is the gap assumption that allows the protocol to remain secure even in the presence of malicious insiders. Both ideas have been successfully used in creating various protocols secure in the eCK model. In this paper, we construct two eCK-secure protocols without the above mentioned ideas. KFU1 is secure under the GDH assumption without using the NAXOS' approach. KFU2 builds upon KFU1 and drops the gap requirement, thus it is secure under the CDH assumption. Efficiency and security of the proposed protocols are comparable to the well-known HMQV [15] protocol. Furthermore, unlike HMQV and NAXOS the use of the random oracle in KFU1 and KFU2 is restricted to the key derivation function making them more suitable for practical applications.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | authenticated key exchange; eCK model; NAXOS' approach; trapdoor test |
Subjects: | Q Science > QA Mathematics > QA075 Electronic computers. Computer science |
Divisions: | Faculty of Engineering and Natural Sciences |
Depositing User: | Berkant Ustaoğlu |
Date Deposited: | 29 Mar 2012 14:24 |
Last Modified: | 31 Jul 2019 10:27 |
URI: | https://research.sabanciuniv.edu/id/eprint/18944 |