Signed (Group) Diffie–Hellman Key Exchange with Tight Security

نویسندگان

چکیده

Abstract We propose the first tight security proof for ordinary two-message signed Diffie–Hellman key exchange protocol in random oracle model. Our is based on strong computational assumption and multiuser of a digital signature scheme. With our proof, DH can be deployed with optimal parameters, independent number users or sessions, without need to compensate any loss. abstract approach new notion called verifiable exchange. In contrast known three-message variant (Gjøsteen Jager, in: Shacham, Boldyreva (eds) CRYPTO 2018, Part II. LNCS, Springer, Heidelberg, 2018), we do not require modification original protocol, tightness result proven “Single-Bit-Guess” model which know tightly composed symmetric cryptographic primitives establish secure channel. Finally, extend group setting construct authenticated protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Key Exchange with Tight Security Reduction

In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, which have efficient online computation and tight security proof in the extended Canetti-Krawczyk (eCK) model. SMEN takes 1.25 exponentiations in online computation, close to that (1.17 exponentiations) of the most efficient AKEs MQV and its variants HMQV and CMQV. SMEN has a security reduction as tight as...

متن کامل

A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange

The IEEE 802 standards ease the deployment of networking infrastructures and enable employers to access corporate networks while traveling. These standards provide two modes of communication called infrastructure and ad-hoc modes. A security solution for the IEEE 802.11’s infrastructure mode took several years to reach maturity and firmware are still been upgraded, yet a solution for the ad-hoc...

متن کامل

Survey on Security Requirements and Models for Group Key Exchange

In this paper we provide an analytical survey on security issues that are relevant for group key exchange protocols. We start with the description of the security requirements that have been informally described in the literature and widely used to analyze security of earlier group key exchange protocols. Most of these definitions were originally stated for two-party protocols and then adapted ...

متن کامل

On Security Models and Compilers for Group Key Exchange Protocols

Group key exchange (GKE) protocols can be used to guarantee confidentiality and group authentication in a variety of group applications. The notion of provable security subsumes the existence of an abstract formalization (security model) that considers the environment of the protocol and identifies its security goals. The first security model for GKE protocols was proposed by Bresson, Chevassut...

متن کامل

Security-Focused Survey on Group Key Exchange Protocols

In this paper we overview a large number of currently known group key exchange protocols while focusing on the protocols designed for more than three participants (for an overview of twoand three-party key exchange protocols we refer to [BM03, DB05c]). For each mentioned protocol we briefly describe the current state of security based on the original analysis as well as later results appeared i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptology

سال: 2022

ISSN: ['0933-2790', '1432-1378']

DOI: https://doi.org/10.1007/s00145-022-09438-y