Abstract
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages. To capture the malicious behaviors of the adversaries, there have been many efforts to define security models. Amongst them, the extended Canetti–Krawczyk ((Formula presented.)) security model is considered one of the strongest security models and has been widely adopted. In this paper, we present a simple construction of a pairing-based (Formula presented.) -secure AKE protocol in the standard model. Our protocol can be instantiated with a suitable signature scheme (i.e., an existentially unforgeable signature scheme against adaptive chosen message attacks). The underlying assumptions of our construction are the decisional bilinear Diffie–Hellman assumption and the existence of a pseudorandom function. Note that the previous (Formula presented.) -secure protocol constructions either relied on random oracles for their security or used somewhat strong assumptions, such as the existence of strong-pseudorandom functions, target collision-resistant functions, etc., while our protocol construction uses fewer and more-standard assumptions in the standard model. Furthermore, preserving the same security argument, our protocol can be instantiated with any appropriate signature scheme that comes in the future with better efficiency.
Author supplied keywords
Cite
CITATION STYLE
Alawatugoda, J. (2023). Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions. Cryptography, 7(1). https://doi.org/10.3390/cryptography7010001
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.