Strongly Secure Authenticated Key Exchange Without Naxos' Approach

Loading...

Date

Authors

Journal Title

Journal ISSN

Volume Title

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 10%
Influence
Top 10%
Popularity
Average

relationships.isProjectOf

relationships.isJournalIssueOf

Abstract

LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X∈=∈g H(x,a). As a result, no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. In other words, the discrete logarithm of an ephemeral public key, which is typically the ephemeral secret, is hidden via an additional random oracle. In this paper, we show that it is possible to construct eCK-secure protocol without the NAXOS' approach by proposing two eCK-secure protocols. One is secure under the GDH assumption and the other under the CDH assumption; their efficiency and security assurances are comparable to the well-known HMQV [12] protocol. Furthermore, they are at least as secure as protocols that use the NAXOS' approach but unlike them and HMQV, the use of the random oracle is minimized and restricted to the key derivation function. © 2009 Springer-Verlag Berlin Heidelberg.

Description

4th International Workshop on Security, IWSEC 2009; Toyama; Japan; 28 October 2009 through 30 October 2009

Keywords

Network protocols, Authenticated key exchange, NAXOS' approach, Trapdoor test, eCK model, Authenticated key exchange, NAXOS' approach, Network protocols, eCK model, Trapdoor test

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences

Citation

Kim, M., Fujioka, A., and Ustaoğlu, B. (2009). Strongly secure authenticated key exchange without NAXOS' approach. Lecture Notes in Computer Science, 5824 LNCS, 174-191. doi:10.1007/978-3-642-04846-3_12

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
25

Volume

5824 LNCS

Issue

Start Page

174

End Page

191
PlumX Metrics
Citations

CrossRef : 21

Scopus : 37

Captures

Mendeley Readers : 26

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
5.74727739

Sustainable Development Goals