Skip to main content
Log in

A note on the strong authenticated key exchange with auxiliary inputs

  • Correspondence
  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

The Original Article was published on 02 November 2016

Abstract

Recently, Chen et al. proposed a framework for authenticated key exchange (AKE) protocols (referred to as CMYSG scheme) in Designs, Codes and Cryptography (available at http://link.springer.com/article/10.1007/s10623-016-0295-3). It is claimed that the proposed AKE protocol is secure in a new leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK). The main tool used for the generic construction is the smooth projective hash function (SPHF). In this note, we revisit the CMYSG scheme and point out a subtle flaw in the original security proof. Precisely, we show that the AI-LR-eCK security of the proposed construction cannot be successfully reduced to a pseudo-random SPHF and thus the CMYSG scheme is not secure as claimed. To restore the security proof, we replace the underlying typical SPHF with a 2-smooth SPHF, and show that such a replacement combined with a \(\pi \hbox {PRF}\) suffices to overcome the subtle flaw.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strong authenticated key exchange with auxiliary input. Des. Codes Cryptogr. 1–29 (2016). doi:10.1007/s10623-016-0295-3.

  2. Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: CT-RSA, pp. 19–36 (2016).

  3. Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strong authenticated key exchange with auxiliary inputs. Cryptology ePrint Archive, Report 2017/418. http://eprint.iacr.org/2017/418 (2017).

  4. Okamoto T.: Authenticated key exchange and key encapsulation in the standard model. In: ASIACRYPT, pp. 474–484 (2007).

Download references

Acknowledgements

We would like to thank Colin Boyd for his helpful suggestions in improving this note.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Zheng.

Additional information

Communicated by C. Boyd.

The paper titled “Strong Authenticated Key Exchange with Auxiliary Inputs” has been published in the Designs, Codes and Cryptography (available at http://link.springer.com/article/10.1007/s10623-016-0295-3). This note is mainly to point out a subtle flaw in the original security proof, and provide a fixing solution to restore the security proof.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, R., Mu, Y., Yang, G. et al. A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85, 175–178 (2017). https://doi.org/10.1007/s10623-017-0386-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-017-0386-9

Keywords

Mathematics Subject Classification

Navigation