Efficient Key Exchange With Tight Security Reduction

dc.contributor.author Wu, Jiang
dc.contributor.author Ustaoğlu, Berkant
dc.date.accessioned 2017-02-02T11:02:54Z
dc.date.available 2017-02-02T11:02:54Z
dc.date.issued 2009
dc.description.abstract In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, which have efficient online computation and tight security proof in the extended Canetti-Krawczyk (eCK) model. SMEN takes 1.25 exponentiations in online computation, close to that (1.17 exponentiations) of the most efficient AKEs MQV and its variants HMQV and CMQV. SMEN has a security reduction as tight as that of NAXOS, which is the first AKE having a tight security reduction in the eCK model. As a comparison, MQV does not have a security proof; both HMQV and CMQV have a highly non-tight security reduction, and HMQV needs a non-standard assumption; NAXOS takes 2.17 exponentiations in online computation; NETS, a NAXOS variant, takes two online exponentiations in online computation. SMEN simultaneously achieves online efficiency and a tight security proof at a cost of 0.17 more exponentiations in offline computation and the restriction that one party is not allowed to establish a key with itself. SMEN− takes 1.29 exponentiations in online computation, but SMEN− does not use the static private key to compute the ephemeral public key (as does in SMEN, NAXOS, CMQV, and NETS), and hence reduces the risk of leaking the static private key. en_US
dc.identifier.citation Wu, J., and Ustaoğlu, B. (2009). Efficient key exchange with tight security reduction. Cryptology ePrint Archive, Report 2009/288. http://eprint.iacr.org/2009/288 en_US
dc.identifier.uri https://hdl.handle.net/11147/4785
dc.language.iso en en_US
dc.publisher International Association for Cryptologic Research en_US
dc.relation.ispartof Cryptology ePrint Archive en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Cryptographic protocols en_US
dc.subject Authenticated key exchange en_US
dc.subject HMQV en_US
dc.subject SMEN en_US
dc.title Efficient Key Exchange With Tight Security Reduction en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.institutional Wu, Jiang
gdc.author.institutional Ustaoğlu, Berkant
gdc.author.yokid 102756
gdc.coar.access open access
gdc.coar.type text::journal::journal article
gdc.description.department İzmir Institute of Technology. Mathematics en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality N/A
gdc.description.volume Report 2009/288 en_US
gdc.description.wosquality N/A
relation.isAuthorOfPublication.latestForDiscovery e58ceea7-82b9-4d8c-a531-02cb47780412
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4012-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
4785.pdf
Size:
221.44 KB
Format:
Adobe Portable Document Format
Description:
Makale

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: