首页> 外文会议>Fourth International Conference,Inscrypt 2008(第四届中国密码学与信息安全国际会议) >Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
【24h】

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem

机译:基于计算Diffie-Hellman问题的强安全认证密钥交换协议

获取原文
获取原文并翻译 | 示例

摘要

Currently, there are a lot of authenticated key exchange (AKE) protocols in literature. However, the security proofs of this kind of protocols have been established to be a non-trivial task. The main issue is that without static private key it is difficult for simulator to fully support the SessionKeyReveal and EphemeralKeyReveal queries. Some proposals which have been proven secure either just hold in relatively weak models which do not fully support above-mentioned two queries or make use of the stronger gap assumption.In this paper, using a new technique named twin Diffie-Hellman problem proposed by Cash, Kiltz and Shoup, we present a new AKE protocol based on the computational Diffie-Hellman (CDH) assumption, which is more standard than gap Diffie-Hellman (GDH) assumption. Moreover, our scheme is shown to be secure in strong security definition, the enhanced Canetti-Krawczyk (eCK) model introduced by LaMacchia, Lauter and Mityagin, which better supports the adversaries' queries than previous models.
机译:当前,文献中有很多认证密钥交换(AKE)协议。但是,已将此类协议的安全性证明确定为一项艰巨的任务。主要问题是,如果没有静态私钥,模拟器将很难完全支持SessionKeyReveal和EphemeralKeyReveal查询。一些已被证明是安全的建议要么只是在相对弱的模型中成立,而这些模型不能完全支持上述两个查询,要么利用更强的缺口假设。本文采用了Cash提出的名为Twin Diffie-Hellman问题的新技术。 ,Kiltz和Shoup,我们提出了一种基于计算Diffie-Hellman(CDH)假设的新AKE协议,它比gap Diffie-Hellman(GDH)假设更为标准。此外,我们的方案在强大的安全性定义上被证明是安全的,这是LaMacchia,Lauter和Mityagin引入的增强型Canetti-Krawczyk(eCK)模型,它比以前的模型更好地支持了对手的查询。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号