Paper 2013/365

Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model

Zheng Yang

Abstract

The extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for authenticated key exchange protocols that capture leakage of various kinds of secret information like the long-term private key and session-specific secret state. In this paper, we study the open problem on constructing eCK secure AKE protocol without random oracles and NAXOS like trick. A generic construction GC-KKN satisfying those requirements is first given relying on standard cryptographic primitives following the guideline of efficiency. On the second a concrete protocol is proposed which is the first eCK secure protocol in the standard model under both standard assumptions and post-specified peer setting. Both proposed schemes can be more efficiently implemented with secure device than previous eCK secure protocols in the standard model, where the secure device might be normally used to store the long-term private key and implement algorithms of protocol which require to be resilience of state leakage.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
zheng yang @ rub de
History
2013-07-06: last of 3 revisions
2013-06-10: received
See all versions
Short URL
https://ia.cr/2013/365
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/365,
      author = {Zheng Yang},
      title = {Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model},
      howpublished = {Cryptology ePrint Archive, Paper 2013/365},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/365}},
      url = {https://eprint.iacr.org/2013/365}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.