Abstract
In this paper, we give a generic construction of two-pass authenticated key exchange (AKE) protocol from key encapsulation mechanism (KEM). Our construction is provably secure without random oracles in the CK + model which is stronger than CK model and eCK model. Compared with similar KEM-based AKE protocols, our generic construction achieves CK + security with the minimal KEM (namely, one CCA-secure KEM and one CPA-secure KEM).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Law, L., et al.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28(2), 119–134 (2003)
Krawczyk, H.: HMQV: A high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005)
LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)
Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H) MQV and NAXOS. Designs, Codes and Cryptography 46(3), 329–342 (2008)
Dent, A.W.: Adapting the weaknesses of the random oracle model to the generic group model. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 100–109. Springer, Heidelberg (2002)
Boyd, C., Cliff, Y., Gonzalez Nieto, J.M., Paterson, K.G.: Efficient One-Round Key Exchange in the Standard Model. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 69–83. Springer, Heidelberg (2008)
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)
Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 467–484. Springer, Heidelberg (2012)
Kurosawa, K., Furukawa, J.: 2-Pass Key Exchange Protocols from CPA-Secure KEM. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 385–401. Springer, Heidelberg (2014)
Kurosawa, K., Phong, L.T.: Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. In: IACR Cryptology ePrint Archive 2013, p. 765 (2013), http://eprint.iacr.org/2013/765
Fujioka, A., et al.: Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. In: IACR Cryptology ePrint Archive 2012, p. 211 (2012), http://eprint.iacr.org/2012/211
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)
Cremers, C.J.: Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange. In: IACR Cryptology ePrint Archive, p. 253 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Tian, B., Wei, F., Ma, C. (2015). Strongly Secure Key Exchange Protocol with Minimal KEM. In: Lopez, J., Wu, Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science(), vol 9065. Springer, Cham. https://doi.org/10.1007/978-3-319-17533-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-17533-1_10
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17532-4
Online ISBN: 978-3-319-17533-1
eBook Packages: Computer ScienceComputer Science (R0)