Generic construction of an eCK -secure key exchange protocol in the standard model
File version
Author(s)
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
License
Abstract
LaMacchia, Lauter and Mityagin presented a strong security model for authenticated key agreement, namely the eCK model. They also constructed a protocol, namely the NAXOS protocol, that enjoys a simple security proof in the eCK model. However, the NAXOS protocol uses a random oracle-based technique to combine the long-term secret key and the per session randomness, so-called NAXOS trick, in order to achieve the eCK security definition. For NAXOS trick-based protocols, the leakage of per session randomness modeled in the eCK model is somewhat unnatural, because the eCK model leaks per session randomness, while the output of the NAXOS trick computation remains safe. In this work, we present a standard model eCK -secure protocol construction, eliminating the NAXOS trick. Moreover, our protocol is a generic construction, which can be instantiated with arbitrary suitable cryptographic primitives. Thus, we present a generic eCK -secure, NAXOS-free, standard model key exchange protocol. To the best of our knowledge this is the first paper on generic transformation of a CCA 2 -secure public-key encryption scheme to an eCK -secure key exchange protocol in the standard model.
Journal Title
International Journal of Information Security
Conference Title
Book Title
Edition
Volume
16
Issue
5
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject
Cryptography
Information and computing sciences
Science & Technology
Technology
Computer Science, Information Systems
Computer Science, Software Engineering
Computer Science, Theory & Methods
Persistent link to this record
Citation
Alawatugoda, J, Generic construction of an eCK-secure key exchange protocol in the standard model, International Journal of Information Security, 2017, 16 (5), pp. 541-557