Signed (Group) Diffie–Hellman Key Exchange with Tight Security
نویسندگان
چکیده
Abstract We propose the first tight security proof for ordinary two-message signed Diffie–Hellman key exchange protocol in random oracle model. Our is based on strong computational assumption and multiuser of a digital signature scheme. With our proof, DH can be deployed with optimal parameters, independent number users or sessions, without need to compensate any loss. abstract approach new notion called verifiable exchange. In contrast known three-message variant (Gjøsteen Jager, in: Shacham, Boldyreva (eds) CRYPTO 2018, Part II. LNCS, Springer, Heidelberg, 2018), we do not require modification original protocol, tightness result proven “Single-Bit-Guess” model which know tightly composed symmetric cryptographic primitives establish secure channel. Finally, extend group setting construct authenticated protocol.
منابع مشابه
Efficient Key Exchange with Tight Security Reduction
In this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, which have efficient online computation and tight security proof in the extended Canetti-Krawczyk (eCK) model. SMEN takes 1.25 exponentiations in online computation, close to that (1.17 exponentiations) of the most efficient AKEs MQV and its variants HMQV and CMQV. SMEN has a security reduction as tight as...
متن کاملA security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange
The IEEE 802 standards ease the deployment of networking infrastructures and enable employers to access corporate networks while traveling. These standards provide two modes of communication called infrastructure and ad-hoc modes. A security solution for the IEEE 802.11’s infrastructure mode took several years to reach maturity and firmware are still been upgraded, yet a solution for the ad-hoc...
متن کاملSurvey on Security Requirements and Models for Group Key Exchange
In this paper we provide an analytical survey on security issues that are relevant for group key exchange protocols. We start with the description of the security requirements that have been informally described in the literature and widely used to analyze security of earlier group key exchange protocols. Most of these definitions were originally stated for two-party protocols and then adapted ...
متن کاملOn Security Models and Compilers for Group Key Exchange Protocols
Group key exchange (GKE) protocols can be used to guarantee confidentiality and group authentication in a variety of group applications. The notion of provable security subsumes the existence of an abstract formalization (security model) that considers the environment of the protocol and identifies its security goals. The first security model for GKE protocols was proposed by Bresson, Chevassut...
متن کاملSecurity-Focused Survey on Group Key Exchange Protocols
In this paper we overview a large number of currently known group key exchange protocols while focusing on the protocols designed for more than three participants (for an overview of twoand three-party key exchange protocols we refer to [BM03, DB05c]). For each mentioned protocol we briefly describe the current state of security based on the original analysis as well as later results appeared i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2022
ISSN: ['0933-2790', '1432-1378']
DOI: https://doi.org/10.1007/s00145-022-09438-y