Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles

被引:0
|
作者
Ishibashi, Ren [1 ]
Yoneyama, Kazuki [1 ]
机构
[1] Ibaraki Univ, Hitachi 3168511, Japan
关键词
authenticated key exchange; one-sided secure; anonymity; post-quantum; isogenies; SECURE;
D O I
10.1587/transfun.2022DMP0001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to guarantee secrecy of the session key and mutual authentication. However, in practice, there are many cases where mutual authentication is undesirable such as in anonymous networks like Tor and Riffle, or difficult to achieve due to the certificate management at the user level such as the Internet. Goldberg et al. formulated a model of anonymous one-sided AKE which guarantees the anonymity of the client by allowing only the client to authenticate the server, and proposed a concrete scheme. However, existing anonymous one-sided AKE schemes are only known to be secure in the random oracle model. In this paper, we propose generic constructions of anonymous one-sided AKE in the random oracle model and in the standard model, respectively. Our constructions allow us to construct the first post-quantum anonymous one-sided AKE scheme from isogenies in the standard model.
引用
收藏
页码:1141 / 1163
页数:23
相关论文
共 50 条
  • [1] Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 35 - 65
  • [2] A practical strongly secure one-round authenticated key exchange protocol without random oracles
    Yang, Zheng
    Yang, Wu
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1118 - 1131
  • [3] An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
    Moriyama, Daisuke
    Okamoto, Tatsuaki
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 154 - +
  • [4] An efficient strongly secure authenticated key exchange protocol without random oracles
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1461 - 1473
  • [5] An eCK-secure Authenticated Key Exchange Protocol without Random Oracles
    Moriyama, Daisuke
    Okamoto, Tatsuaki
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (03): : 607 - 625
  • [6] Sender Authenticated Key Agreements without Random Oracles
    Sato, Chifumi
    Okamoto, Takeshi
    Okamoto, Eiji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1787 - 1794
  • [7] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
    Yi, Xun
    Tso, Raylin
    Okamoto, Eiji
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
  • [8] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [10] Provably secure post-quantum authenticated key exchange from supersingular isogenies
    Mingping Qi
    Jianhua Chen
    The Journal of Supercomputing, 2022, 78 : 12815 - 12833