The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model

Jooyoung LEE, Je Hong PARK

  • Full Text Views

    0

  • Cite this

Summary :

In this paper, we propose two authenticated key exchange(AKE) protocols and prove their security in the extended Canetti-Krawczyk model. The first protocol, called NAXOS+, is obtained by slightly modifying the NAXOS protocol proposed by LaMacchia, Lauter and Mityagin [15]. We prove its security under the Computational Diffie-Hellman (CDH) assumption by using the trapdoor test introduced in [6]. To the authors' knowledge, this is the first AKE protocol which is secure under the CDH assumption in the eCK model. The second protocol, called NETS, enjoys a simple and tight security reduction compared to existing schemes including HMQV and CMQV without using the Forking Lemma. Since each session of the NETS protocol requires only three exponentiations per party, its efficiency is also comparable to MQV, HMQV and CMQV.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E94-A No.1 pp.129-138
Publication Date
2011/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E94.A.129
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Secure Protocol

Authors

Keyword