Compact Authenticated Key Exchange from Bounded CCA-Secure KEM

被引:0
|
作者
Yoneyama, Kazuki [1 ]
机构
[1] NTT Corp, NTT Secure Platform Labs, Musashino, Tokyo 1808585, Japan
关键词
authenticated key exchange; key encapsulation mechanism; bounded CCA; CRYPTOSYSTEM; STRONGER; PROTOCOL;
D O I
10.1587/transfun.E98.A.132
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
How to reduce communication complexity is a common important issue to design cryptographic protocols. This paper focuses on authenticated key exchange (AKE). Several AKE schemes have been studied, which satisfy strong security such as exposure-resilience in the standard model (StdM). However, there is a large gap on communication costs between schemes in the StdM and in the random oracle model. In this paper, we show a generic construction that is significantly compact (i.e., small communication cost) and secure in the StdM. We follow an existing generic construction from key encapsulated mechanism (KEM). Our main technique is to use a bounded chosen-ciphertext secure KEM instead of an ordinary chosen-ciphertext secure KEM. The communication cost can be reduced to half by this technique, and we achieve the most compact AKE scheme in the StdM. Moreover, our construction has instantiations under wider classes of hardness assumptions (e.g., subset-sum problems and multi-variate quadratic systems) than existing constructions. This work pioneers the first meaningful application of bounded chosen-ciphertext secure KEM.
引用
收藏
页码:132 / 143
页数:12
相关论文
共 50 条
  • [41] Secure authenticated key exchange for WSNs in IoT applications
    Mingping Qi
    Jianhua Chen
    The Journal of Supercomputing, 2021, 77 : 13897 - 13910
  • [42] Authenticated key exchange secure against dictionary attacks
    Bellare, M
    Pointcheval, D
    Rogaway, P
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 139 - 155
  • [43] Biometrics-Authenticated Key Exchange for Secure Messaging
    Wang, Mei
    He, Kun
    Chen, Jing
    Li, Zengpeng
    Zhao, Wei
    Du, Ruiying
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2618 - 2631
  • [44] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [45] A secure authenticated key exchange protocol for credential services
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 139 - 149
  • [46] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [47] Tightly-Secure Authenticated Key Exchange, Revisited
    Jager, Tibor
    Kiltz, Eike
    Riepel, Doreen
    Schaege, Sven
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 117 - 146
  • [48] Secure Authenticated Key Exchange Protocol for Credential Services
    Balakrishna, R.
    Rao, U. Rajeswara
    Geethanjali, N.
    DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2009, 29 (03): : 49 - 54
  • [49] A New Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Ma, Chuangui
    Hu, Xuexian
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 135 - 144
  • [50] Verifiability-based conversion from CPA to CCA-secure predicate encryption
    Nandi, Mridul
    Pandit, Tapas
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (01) : 77 - 102