eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy

作者: Tapas Pandit , Rana Barua , Somanath Tripathy

DOI: 10.1007/978-3-319-11698-3_33

关键词: Random oracleComputer security modelComputer networkProtocol (science)Authenticated Key ExchangePublic-key cryptographyComputer scienceSession (computer science)ID-based cryptographyForward secrecyComputer security

摘要: Recently, extended Canetti-Krawczyk (eCK) model for Authenticated Key Exchange (AKE) protocol, proposed by LaMacchia, Lauter and Mityagin, is considered to be one of the stronger security models that covers many attacks on existing models. Unfortunately, it does not capture very sensitive barricades, Perfect Forward Secrecy (PFS) Master (MPFS) in ID-based setting. An AKE protocol with PFS (resp. MPFS) ensures revealing static keys parties master secret key private generator), must compromise even a single bit session past sessions between parties. In current status, best our knowledge, there no eCK secure round either or MPFS. Proposed here, are protocols MPFS random oracle model. Towards achieving this goal, we also construct protocols, without (MFS) remaining MFS, almost at same computational cost as efficient Secure Single Round protocols. All under Gap Bilinear Diffie-Hellman (GBDH) problem.

参考文章(34)
Michèle Feltz, Cas J. F. Cremers, One-round strongly secure key exchange with perfect forward secrecy and deniability IACR Cryptology ePrint Archive. ,vol. 2011, pp. 300- ,(2011) , 10.3929/ETHZ-A-006519221
Atsuko Miyaji, Marc Joye, Akira Otsuka, Pairing-Based Cryptography - Pairing 2010 ,(2011)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Jeffrey Shallit, Eric Bach, Algorithmic number theory MIT Press. ,(1996)
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoğlu, Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys international conference on pairing based cryptography. pp. 187- 205 ,(2010) , 10.1007/978-3-642-17455-1_12
Sherman S. M. Chow, Kim-Kwang Raymond Choo, Strongly-Secure Identity-Based Key Agreement and Anonymous Extension Lecture Notes in Computer Science. pp. 203- 220 ,(2007) , 10.1007/978-3-540-75496-1_14
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Noel McCullagh, Paulo S. L. M. Barreto, A New Two-Party Identity-Based Authenticated Key Agreement Lecture Notes in Computer Science. pp. 262- 274 ,(2005) , 10.1007/978-3-540-30574-3_18
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5