Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages. To capture the malicious behaviors of the adversaries, there have been many efforts to define security models. Amongst them, the extended Canetti–Krawczyk ((Formula presented.)) security model is considered one of the strongest security models and has been widely adopted. In this paper, we present a simple construction of a pairing-based (Formula presented.) -secure AKE protocol in the standard model. Our protocol can be instantiated with a suitable signature scheme (i.e., an existentially unforgeable signature scheme against adaptive chosen message attacks). The underlying assumptions of our construction are the decisional bilinear Diffie–Hellman assumption and the existence of a pseudorandom function. Note that the previous (Formula presented.) -secure protocol constructions either relied on random oracles for their security or used somewhat strong assumptions, such as the existence of strong-pseudorandom functions, target collision-resistant functions, etc., while our protocol construction uses fewer and more-standard assumptions in the standard model. Furthermore, preserving the same security argument, our protocol can be instantiated with any appropriate signature scheme that comes in the future with better efficiency.

Cite

CITATION STYLE

APA

Alawatugoda, J. (2023). Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions. Cryptography, 7(1). https://doi.org/10.3390/cryptography7010001

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free