Strongly Secure Authenticated Key Exchange Without Naxos' Approach

dc.contributor.author Kim, Minkyu
dc.contributor.author Fujioka, Atsushi
dc.contributor.author Ustaoğlu, Berkant
dc.coverage.doi 10.1007/978-3-642-04846-3_12
dc.date.accessioned 2017-02-01T10:56:20Z
dc.date.available 2017-02-01T10:56:20Z
dc.date.issued 2009
dc.description 4th International Workshop on Security, IWSEC 2009; Toyama; Japan; 28 October 2009 through 30 October 2009 en_US
dc.description.abstract LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X∈=∈g H(x,a). As a result, no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. In other words, the discrete logarithm of an ephemeral public key, which is typically the ephemeral secret, is hidden via an additional random oracle. In this paper, we show that it is possible to construct eCK-secure protocol without the NAXOS' approach by proposing two eCK-secure protocols. One is secure under the GDH assumption and the other under the CDH assumption; their efficiency and security assurances are comparable to the well-known HMQV [12] protocol. Furthermore, they are at least as secure as protocols that use the NAXOS' approach but unlike them and HMQV, the use of the random oracle is minimized and restricted to the key derivation function. © 2009 Springer-Verlag Berlin Heidelberg. en_US
dc.identifier.citation Kim, M., Fujioka, A., and Ustaoğlu, B. (2009). Strongly secure authenticated key exchange without NAXOS' approach. Lecture Notes in Computer Science, 5824 LNCS, 174-191. doi:10.1007/978-3-642-04846-3_12 en_US
dc.identifier.doi 10.1007/978-3-642-04846-3_12 en_US
dc.identifier.isbn 9783642048456
dc.identifier.issn 0302-9743
dc.identifier.issn 1611-3349
dc.identifier.uri http://doi.org/10.1007/978-3-642-04846-3_12
dc.identifier.uri http://hdl.handle.net/11147/4773
dc.language.iso tr en_US
dc.publisher Springer Verlag en_US
dc.relation.ispartof Lecture Notes in Computer Science en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Network protocols en_US
dc.subject Authenticated key exchange en_US
dc.subject NAXOS' approach en_US
dc.subject Trapdoor test en_US
dc.subject eCK model en_US
dc.title Strongly Secure Authenticated Key Exchange Without Naxos' Approach en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.institutional Kim, Minkyu
gdc.author.institutional Fujioka, Atsushi
gdc.author.institutional Ustaoğlu, Berkant
gdc.bip.impulseclass C4
gdc.bip.influenceclass C4
gdc.bip.popularityclass C5
gdc.coar.access open access
gdc.coar.type text::conference output
gdc.collaboration.industrial true
gdc.description.department İzmir Institute of Technology. Mathematics en_US
gdc.description.endpage 191 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q3
gdc.description.startpage 174 en_US
gdc.description.volume 5824 LNCS en_US
gdc.description.wosquality N/A
gdc.identifier.openalex W1515922132
gdc.identifier.wos WOS:000273606100011
gdc.index.type WoS
gdc.index.type Scopus
gdc.oaire.diamondjournal false
gdc.oaire.impulse 15.0
gdc.oaire.influence 4.8208593E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Authenticated key exchange
gdc.oaire.keywords NAXOS' approach
gdc.oaire.keywords Network protocols
gdc.oaire.keywords eCK model
gdc.oaire.keywords Trapdoor test
gdc.oaire.popularity 4.250168E-9
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.sciencefields 0102 computer and information sciences
gdc.oaire.sciencefields 02 engineering and technology
gdc.oaire.sciencefields 01 natural sciences
gdc.openalex.collaboration International
gdc.openalex.fwci 5.74727739
gdc.openalex.normalizedpercentile 0.97
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 25
gdc.plumx.crossrefcites 21
gdc.plumx.mendeley 26
gdc.plumx.scopuscites 37
gdc.wos.citedcount 28
relation.isAuthorOfPublication.latestForDiscovery e58ceea7-82b9-4d8c-a531-02cb47780412
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4012-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
4773.pdf
Size:
214.67 KB
Format:
Adobe Portable Document Format
Description:
Conference Paper

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: