Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles

被引:0
|
作者
Ishibashi, Ren [1 ]
Yoneyama, Kazuki [1 ]
机构
[1] Ibaraki Univ, Hitachi 3168511, Japan
关键词
authenticated key exchange; one-sided secure; anonymity; post-quantum; isogenies; SECURE;
D O I
10.1587/transfun.2022DMP0001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to guarantee secrecy of the session key and mutual authentication. However, in practice, there are many cases where mutual authentication is undesirable such as in anonymous networks like Tor and Riffle, or difficult to achieve due to the certificate management at the user level such as the Internet. Goldberg et al. formulated a model of anonymous one-sided AKE which guarantees the anonymity of the client by allowing only the client to authenticate the server, and proposed a concrete scheme. However, existing anonymous one-sided AKE schemes are only known to be secure in the random oracle model. In this paper, we propose generic constructions of anonymous one-sided AKE in the random oracle model and in the standard model, respectively. Our constructions allow us to construct the first post-quantum anonymous one-sided AKE scheme from isogenies in the standard model.
引用
收藏
页码:1141 / 1163
页数:23
相关论文
共 50 条
  • [21] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [23] Efficient module learning with errors-based post-quantum password-authenticated key exchange
    Ren, Peixin
    Gu, Xiaozhuo
    Wang, Ziliang
    IET INFORMATION SECURITY, 2023, 17 (01) : 3 - 17
  • [24] Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice
    Ren, Peixin
    Gu, Xiaozhuo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 137 - 156
  • [25] Towards post-quantum authenticated key agreement scheme for mobile devices
    Pursharthi, Komal
    Mishra, Dheerendra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [26] Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
    Suzuki, Koutarou
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06) : 1345 - 1355
  • [27] Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
    Kraemer, Juliane
    Struck, Patrick
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 539 - 558
  • [28] OpenSSLNTRU: Faster post-quantum TLS key exchange
    Bernstein, Daniel J.
    Brumley, Billy Bob
    Chen, Ming-Shing
    Tuveri, Nicola
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 845 - 862
  • [29] High Performance Post-Quantum Key Exchange on FPGAs
    Kuo, Po-Chun
    Chen, Yu-Wei
    Hsu, Yuan-Che
    Cheng, Chen-Mou
    LI, Wen-Ding
    Yang, Bo-Yin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2021, 37 (05) : 1211 - 1229
  • [30] Post-quantum secure authenticated key agreement protocol for wireless sensor networks
    Singh, Mrityunjay
    Mishra, Dheerendra
    TELECOMMUNICATION SYSTEMS, 2023, 84 (1) : 101 - 113