Tightly Secure ID-based Authenticated Key Exchange

被引:0
作者
Mita, Takumu [1 ]
Yoneyama, Kazuki [1 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki, Japan
来源
PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024 | 2024年
关键词
ID-based Key Exchange; tight security; ID-based Signature; IDENTITY-BASED SIGNATURE; GENERIC CONSTRUCTION; AGREEMENT PROTOCOLS;
D O I
10.1145/3659467.3659903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In CRYPTO 2021, Han et al. proposed a PKI-based authenticated key exchange (AKE) scheme that satisfies tight security in the standard model by using KEM and digital signature with multi-user security as building blocks. On the other hand, no tightly secure ID-based AKE (ID-AKE) scheme is known. ID-AKE has the advantage that certificate management is unnecessary, and the authentication can be based on the party's public ID, such as an e-mail address. In this paper, we propose the first tightly secure ID-AKE scheme in the standard model. First, we extend the security model of Han et al.'s PKI-based AKE to the security model for ID-AKE. Next, we introduce a generic construction with multi-user secure KEM and ID-based signature (IBS) as building blocks and prove the tight security in our security model. For instantiating the underlying IBS, we also revisit the security proof of the existing generic construction of tightly secure IBS proposed by Lee et al. We point out a problem in their proof and correct it by strengthening an assumption. As an instantiation of our scheme, a tightly secure ID-AKE scheme under the MDDH assumption can be realized in the standard model.
引用
收藏
页码:42 / 53
页数:12
相关论文
共 37 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Tightly-Secure Authenticated Key Exchange
    Bader, Christoph
    Hofheinz, Dennis
    Jager, Tibor
    Kiltz, Eike
    Li, Yong
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 629 - 658
  • [3] Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
  • [4] Bellare M., 1993, CCS, P62
  • [5] Tightly-Secure Signatures from Chameleon Hash Functions
    Blazy, Olivier
    Kakvi, Saqib A.
    Kiltz, Eike
    Pan, Jiaxin
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
  • [6] Chen J., 2023, PQCRYPTO, P141
  • [7] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [8] Identity based authenticated key agreement protocols from pairings
    Chen, LQ
    Kudla, C
    [J]. 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 219 - 233
  • [9] Chia J., 2021, FResearch., V10, P1
  • [10] Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
    Davis, Hannah
    Gunther, Felix
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 448 - 479