Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable

被引:0
|
作者
Nakagawa, Kohei [1 ]
Fujioka, Atsushi [2 ]
Nagai, Akira [1 ]
Tomida, Junichi [1 ]
Xagawa, Keita [3 ]
Yasuda, Kan [1 ]
机构
[1] NTT Corp, Tokyo, Japan
[2] Kanagawa Univ, Yokohama, Kanagawa, Japan
[3] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023 | 2023年 / 14168卷
关键词
Identity-based authenticated-key exchange; Revocable; Elliptic-curve cryptography; Pairing-free; Protocol implementations; ARM Cortex-M MCU; General forking lemma; Random oracle model; ENCRYPTION; PROTOCOL;
D O I
10.1007/978-3-031-44469-2_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is equipped with scalable key revocation. Our protocol builds upon the most efficient identity-based Diffie-Hellman key exchange (without revocation mechanisms) presented by Fiore and Gennaro at CT-RSA 2010, which can be constructed from pairing-free groups. The key revocation is essential for IB-AKE protocols in long-term practical operation. Our key revocation mechanism allows the key exchange protocol to remain comparable to the original Fiore-Gennaro identity-based key exchange, unlike other revocable schemes that require major (inefficient) modifications to their original IB-AKE protocols. Moreover, our revocation mechanism is scalable, in the sense that its computational cost is logarithmic, rather than linear, to the number of users. We provide a security proof in the identity-based extended Canetti-Krawczyk security model that is further extended in order to incorporate key revocation. The security of our scheme reduces to the well-established strong Diffie-Hellman assumption. For this proof, we devise a multi-forking lemma, an extended version of the general forking lemma.
引用
收藏
页码:171 / 191
页数:21
相关论文
共 50 条
  • [1] A Framework for Universally Composable Diffie-Hellman Key Exchange
    Kuesters, Ralf
    Rausch, Daniel
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 881 - 900
  • [2] Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm
    Jeon, Seok Hee
    Gil, Sang Keun
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2014, 18 (05) : 477 - 484
  • [3] Revocable Hierarchical Identity-Based Authenticated Key Exchange
    Okano, Yuki
    Tomida, Junichi
    Nagai, Akira
    Yoneyama, Kazuki
    Fujioka, Atsushi
    Suzuki, Koutarou
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 3 - 27
  • [4] Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM
    Jalali, Amir
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    Jao, David
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (05) : 902 - 912
  • [5] Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
    Koziel, Brian
    Azarderakhsh, Reza
    Mozaffari-Kermani, Mehran
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 191 - 206
  • [6] Efficient Elliptic Curve Diffie-Hellman Key Exchange for Resource-Constrained IoT Devices
    Tanksale, Vinayak
    ELECTRONICS, 2024, 13 (18)
  • [7] Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
    Sahi, Agee
    Lai, David
    Li, Yan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (04) : 560 - 581
  • [8] A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman
    Gupta, Shilpi
    Sharma, Jaya
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 55 - 58
  • [9] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [10] NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM
    Koziel, Brian
    Jalali, Amir
    Azarderakhsh, Reza
    Jao, David
    Mozaffari-Kermani, Mehran
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 88 - 103