首页> 外文会议>International conference on the theory and application of cryptology and information security >Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism
【24h】

Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism

机译:通过双键封装机制了解和构建AKE

获取原文

摘要

Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique.
机译:通过抽象一些隐式认证密钥交换(AKE)协议背后的共同思想,我们引入了一种称为双键密钥封装机制(2-key KEM)的原语。它是一种特殊的KEM类型,它包含两对私有密钥,并且满足某些功能和安全性。这样的2键KEM充当了核心构建块,并提供了替代方法来简化AKE的构造。为了了解2键KEM的有用性,我们展示如何将AKE的几种现有结构捕获为2键KEM并在统一的框架中加以理解,包括广泛使用的HMQV,NAXOS,冈本AKE和FSXY12-13方案。然后,我们展示(1)如何根据具体假设构造2键KEM,(2)如何适应经典的Fujisaki-Okamoto变换和KEM组合器来实现2键KEM的安全性要求,(3)优雅的Kyber -使用改进的Fujisaki-Okamoto技术在晶格上进行-AKE处理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号