http://iet.metastore.ingenta.com
1887

SignORKE: improving pairing-based one-round key exchange without random oracles

SignORKE: improving pairing-based one-round key exchange without random oracles

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The study presents a new efficient way to construct the one-round key exchange (ORKE) without random oracles based on standard hard complexity assumptions. The authors propose a (PKI-based) ORKE protocol which is more computational efficient than existing pairing-based ORKE protocols without random oracles in the post-specified peer setting. The core idea of this construction is to integrate the consistency check of the ephemeral public key and the verification of the signature into the session key generation. This enables us to roughly save two pairing operations. The authors just call this kind of scheme that is deeply composed by signature and one-round key exchange as SignORKE. The authors’ protocol is shown to be secure in a variant of the Canetti–Krawczyk security model which covers the majority of state-of-the-art active attacks.

References

    1. 1)
      • R. Canetti , H. Krawczyk .
        1. Canetti, R., Krawczyk, H.: ‘Analysis of key-exchange protocols and their use for building secure channels’. Proc. of EUROCRYPT 2001, Innsbruck, Austria, May 2001, pp. 453474.
        . Proc. of EUROCRYPT 2001 , 453 - 474
    2. 2)
      • (2016)
        2. ‘Signal on the outside, Signal on the inside’. Available at https://whispersystems.org/blog/signal-inside-and-out/. accessed March2016.
        .
    3. 3)
      • B.A. LaMacchia , K. Lauter , A. Mityagin .
        3. LaMacchia, B.A., Lauter, K., Mityagin, A.: ‘Stronger security of authenticated key exchange’. Proc. of ProvSec 2007: 1st Int. Conf. on Provable Security, Wollongong, Australia, November 2007, pp. 116.
        . Proc. of ProvSec 2007: 1st Int. Conf. on Provable Security , 1 - 16
    4. 4)
      • C. Boyd , Y. Cliff , J.G. Nieto .
        4. Boyd, C., Cliff, Y., Nieto, J.G., et al: ‘Efficient one-round key exchange in the standard model’. Proc. of ACISP 2008: 13th Australasian Conf. on Information Security and Privacy, Wollongong, Australia, July 2008, pp. 6983.
        . Proc. of ACISP 2008: 13th Australasian Conf. on Information Security and Privacy , 69 - 83
    5. 5)
      • Z. Yang .
        5. Yang, Z.: ‘Efficient eck-secure authenticated key exchange protocols in the standard model’. Proc. of ICICS 2013, Beijing, China, 2013, pp. 185193.
        . Proc. of ICICS 2013 , 185 - 193
    6. 6)
      • F. Bergsma , T. Jager , J. Schwenk .
        6. Bergsma, F., Jager, T., Schwenk, J.: ‘One-round key exchange with strong security: An efficient and generic construction in the standard model’. Proc. of Int. Conf. on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, 30 March–1 April 2015, pp. 477494.
        . Proc. of Int. Conf. on Practice and Theory in Public-Key Cryptography , 477 - 494
    7. 7)
      • Z. Yang , W. Yang .
        7. Yang, Z., Yang, W.: ‘A practical strongly secure one-round authenticated key exchange protocol without random oracles’, Secur. Commun. Netw., 2015, 8, (6), pp. 11181131.
        . Secur. Commun. Netw. , 6 , 1118 - 1131
    8. 8)
      • Z. Yang , S. Li .
        8. Yang, Z., Li, S.: ‘On security analysis of an after-the-fact leakage resilient key exchange protocol’, Inf. Process. Lett., 2016, 116, (1), pp. 3340.
        . Inf. Process. Lett. , 1 , 33 - 40
    9. 9)
      • J.F.C. Cas , M. Feltz .
        9. Cas, J.F.C., Feltz, M.: ‘Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal’. Proc. of ESORICS 2012: 17th European Symp. on Research in Computer Security, Pisa, Italy, September 2012, pp. 734751.
        . Proc. of ESORICS 2012: 17th European Symp. on Research in Computer Security , 734 - 751
    10. 10)
      • H. Krawczyk .
        10. Krawczyk, H.: ‘HMQV: A high-performance secure Diffie-Hellman protocol’. Proc. of CRYPTO 2005, Santa Barbara, CA, USA, August 2005, pp. 546566.
        . Proc. of CRYPTO 2005 , 546 - 566
    11. 11)
      • Z. Yang , D. Zhang .
        11. Yang, Z., Zhang, D.: ‘Towards modelling perfect forward secrecy for one-round group key exchange’, I. J. Netw. Secur., 2016, 18, (2), pp. 304315.
        . I. J. Netw. Secur. , 2 , 304 - 315
    12. 12)
      • A. Chi-Chih Yao , Y. Zhao .
        12. Chi-Chih Yao, A., Zhao, Y.: ‘OAKE: a new family of implicitly authenticated Diffie-Hellman protocols’. Proc. of ACM CCS 13: 20th Conf. on Computer and Communications Security, Berlin, Germany, 4–8 November 2013, pp. 11131128.
        . Proc. of ACM CCS 13: 20th Conf. on Computer and Communications Security , 1113 - 1128
    13. 13)
      • Z. Yang .
        13. Yang, Z.: ‘Efficient eCK-secure authenticated key exchange protocols in the standard model’. ICICS 13: 15th Int. Conf. on Information and Communication Security, Beijing, China, November 20–22, 2013 (LNCS, 8233), pp. 185193.
        . ICICS 13: 15th Int. Conf. on Information and Communication Security , 185 - 193
    14. 14)
      • D. Boneh , X. Boyen .
        14. Boneh, D., Boyen, X.: ‘Short signatures without random oracles’. Proc. of EUROCRYPT 2004, Interlaken, Switzerland, 2004, pp. 5673.
        . Proc. of EUROCRYPT 2004 , 56 - 73
    15. 15)
      • D. Hofheinz , T. Jager , E. Kiltz .
        15. Hofheinz, D., Jager, T., Kiltz, E.: ‘Short signatures from weaker assumptions’. Proc. of ASIACRYPT 2011, Seoul, South Korea, December 2011, pp. 647666.
        . Proc. of ASIACRYPT 2011 , 647 - 666
    16. 16)
      • Y. Zheng .
        16. Zheng, Y.: ‘Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption)’. Proc. of CRYPTO 1997, Santa Barbara, CA, USA, August 1997, pp. 165179.
        . Proc. of CRYPTO 1997 , 165 - 179
    17. 17)
      • J. Alawatugoda , D. Stebila , C. Boyd .
        17. Alawatugoda, J., Stebila, D., Boyd, C.: ‘Modelling after-the-fact leakage for key exchange’. Proc. of ACM Symp. on Information Computer and Communications Security, Kyoto, Japan, June 2014, pp. 207216.
        . Proc. of ACM Symp. on Information Computer and Communications Security , 207 - 216
    18. 18)
      • T. Okamoto .
        18. Okamoto, T.: ‘Authenticated key exchange and key encapsulation in the standard model (invited talk)’. Proc. of ASIACRYPT 2007, Kuching, Malaysia, December 2007, pp. 474484.
        . Proc. of ASIACRYPT 2007 , 474 - 484
    19. 19)
      • V. Shoup . (2004)
        19. Shoup, V.: ‘Sequences of games: a tool for taming complexity in security proofs’. Cryptology ePrint Archive, Report 2004/332, 2004. Available at http://eprint.iacr.org/.
        .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0320
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0320
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address