Loading...
Please wait, while we are loading the content...
Similar Documents
Authenticated Key Exchange and Key Encapsulation without Random Oracles (2007)
| Content Provider | CiteSeerX |
|---|---|
| Author | Okamoto, Tatsuaki |
| Abstract | This paper presents a new paradigm to realize cryptographic primitives such as authenticated key exchange and key encapsulation without random oracles under three assumptions: the decisional Diffie-Hellman (DDH) assumption, target collision resistant (TCR) hash functions and a class of pseudo-random functions (PRFs), πPRFs, PRFs with pairwise-independent random sources. We propose a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is comparably as efficient as the existing most efficient protocols like MQV and that is secure without random oracles (under these assumptions). Our protocol is shown to be secure in the (currently) strongest security definition, the extended Canetti-Krawczyk (eCK) security definition introduced by LaMacchia, Lauter and Mityagin. We also show that a variant of the Kurosawa-Desmedt key encapsulation mechanism (KEM) using a πPRF is CCA-secure under the three assumptions. This scheme is secure in a stronger security notion, the chosen public-key and ciphertext attack (CPCA) security, with using a generalized TCR (GTCR) hash function in place of a TCR hash function. The proposed schemes in this paper are validity-check-free and the implication is that combining them with validity-check-free symmetric encryption (DEM) will yield validity-check-free (e.g., MAC-free) CCA-secure hybrid encryption. |
| File Format | |
| Journal | CRYPTOLOGY EPRINT ARCHIVE |
| Publisher Date | 2007-01-01 |
| Access Restriction | Open |
| Subject Keyword | Random Oracle Key Encapsulation Authenticated Key Exchange Hash Function Security Definition Key Exchange Target Collision Resistant Kurosawa-desmedt Key Encapsulation Mechanism Pseudo-random Function Decisional Diffie-hellman Security Notion Ciphertext Attack Pairwise-independent Random Source Validity-check-free Symmetric Encryption Tcr Hash Function Cryptographic Primitive Cca-secure Hybrid Encryption Efficient Protocol Extended Canetti-krawczyk New Paradigm |
| Content Type | Text |
| Resource Type | Article |