Generic construction of an eCK -secure key exchange protocol in the standard model

No Thumbnail Available
File version
Author(s)
Alawatugoda, Janaka
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2017
Size
File type(s)
Location
License
Abstract

LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simple security proof in the eCK model. However, the NAXOS protocol uses a random oracle-based technique to combine the long-term secret key and the per session randomness, so-called NAXOS trick, in order to achieve the eCK security definition. For NAXOS trick-based protocols, the leakage of per session randomness modeled in the eCK model is somewhat unnatural, because the eCK model leaks per session randomness, while the output of the NAXOS trick computation remains safe. In this work, we present a standard model eCK -secure protocol construction, eliminating the NAXOS trick. Moreover, our protocol is a generic construction, which can be instantiated with arbitrary suitable cryptographic primitives. Thus, we present a generic eCK -secure, NAXOS-free, standard model key exchange protocol. To the best of our knowledge this is the first paper on generic transformation of a CCA 2 -secure public-key encryption scheme to an eCK -secure key exchange protocol in the standard model.

Journal Title

International Journal of Information Security

Conference Title
Book Title
Edition
Volume

16

Issue

5

Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject

Cryptography

Information and computing sciences

Science & Technology

Technology

Computer Science, Information Systems

Computer Science, Software Engineering

Computer Science, Theory & Methods

Persistent link to this record
Citation

Alawatugoda, J, Generic construction of an eCK-secure key exchange protocol in the standard model, International Journal of Information Security, 2017, 16 (5), pp. 541-557

Collections