@ARTICLE{ iet:/content/journals/10.1049/iet-ifs.2016.0320, author = {Zheng Yang}, affiliation = { School of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, People's Republic of China }, author = {Junyu Lai}, affiliation = { School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu 611731, People's Republic of China }, author = {Wanping Liu}, affiliation = { School of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, People's Republic of China }, author = {Chao Liu}, affiliation = { School of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, People's Republic of China }, author = {Song Luo}, affiliation = { School of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, People's Republic of China }, keywords = {pairing-based one-round key exchange;Canetti-Krawczyk security model;SignORKE;pairing-based ORKE protocols;session key generation;}, ISSN = {1751-8709}, language = {English}, abstract = {The study presents a new efficient way to construct the one-round key exchange (ORKE) without random oracles based on standard hard complexity assumptions. The authors propose a (PKI-based) ORKE protocol which is more computational efficient than existing pairing-based ORKE protocols without random oracles in the post-specified peer setting. The core idea of this construction is to integrate the consistency check of the ephemeral public key and the verification of the signature into the session key generation. This enables us to roughly save two pairing operations. The authors just call this kind of scheme that is deeply composed by signature and one-round key exchange as SignORKE. The authors’ protocol is shown to be secure in a variant of the Canetti–Krawczyk security model which covers the majority of state-of-the-art active attacks.}, title = {SignORKE: improving pairing-based one-round key exchange without random oracles}, journal = {IET Information Security}, issue = {5}, volume = {11}, year = {2017}, month = {September}, pages = {243-249(6)}, publisher ={Institution of Engineering and Technology}, copyright = {© The Institution of Engineering and Technology}, url = {https://digital-library.theiet.org/;jsessionid=58fp129scsqa2.x-iet-live-01content/journals/10.1049/iet-ifs.2016.0320} }