A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input

نویسندگان

  • Zheng Yang
  • Chao Liu
  • Wanping Liu
  • Song Luo
  • Hua Long
  • Shuangqing Li
چکیده

We introduce a new lightweight generic compiler that is able to transform any passively forward secure twomessage key exchange (KE) protocols into authenticated key exchange (AKE) protocols with security in the presence of active adversaries who can reveal critical session specific information such as long-term or ephemeral secrets and can establish malicious parties. The compiler is built based on a new security notion regarding noninteractive key exchange with auxiliary input (NIKEA). The NIKEA is able to provide two security properties on the confidentiality and the unforgeability of shared key. Our new compiler is a very useful tool for the design of new AKE protocols in a modular and efficient way, that is suitable for resources constrained devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

(Password) Authenticated Key Establishment: From 2-Party to Group

A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment with 2 more rounds of communication. The compiler introduces neither idealizing assumptions nor high-entropy secrets, e. g., for signing. In particular, applying the compiler to a password-authenticated 2-party key establishme...

متن کامل

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resi...

متن کامل

A Security Weakness in a Generic Construction of a Group Key Exchange Protocol

Protocols for group key exchange are cryptographic algorithms that allow a group of parties communicating over a public network to come up with a common secret key. One of the interesting results of research on group key exchange is the protocol compiler presented by Abdalla et al. in TCC ’07. Abdalla et al.’s compiler shows how one can transform any authenticated 2-party key exchange protocol ...

متن کامل

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model

One-round authenticated key exchange (ORKE) is an established research area, with many prominent protocol constructions like HMQV (Krawczyk, CRYPTO 2005) and Naxos (La Macchia et al., ProvSec 2007), and many slightly different, strong security models. Most constructions combine ephemeral and static Diffie-Hellman Key Exchange (DHKE), in a manner often closely tied to the underlying security mod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016