Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable

被引:0
|
作者
Nakagawa, Kohei [1 ]
Fujioka, Atsushi [2 ]
Nagai, Akira [1 ]
Tomida, Junichi [1 ]
Xagawa, Keita [3 ]
Yasuda, Kan [1 ]
机构
[1] NTT Corp, Tokyo, Japan
[2] Kanagawa Univ, Yokohama, Kanagawa, Japan
[3] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023 | 2023年 / 14168卷
关键词
Identity-based authenticated-key exchange; Revocable; Elliptic-curve cryptography; Pairing-free; Protocol implementations; ARM Cortex-M MCU; General forking lemma; Random oracle model; ENCRYPTION; PROTOCOL;
D O I
10.1007/978-3-031-44469-2_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is equipped with scalable key revocation. Our protocol builds upon the most efficient identity-based Diffie-Hellman key exchange (without revocation mechanisms) presented by Fiore and Gennaro at CT-RSA 2010, which can be constructed from pairing-free groups. The key revocation is essential for IB-AKE protocols in long-term practical operation. Our key revocation mechanism allows the key exchange protocol to remain comparable to the original Fiore-Gennaro identity-based key exchange, unlike other revocable schemes that require major (inefficient) modifications to their original IB-AKE protocols. Moreover, our revocation mechanism is scalable, in the sense that its computational cost is logarithmic, rather than linear, to the number of users. We provide a security proof in the identity-based extended Canetti-Krawczyk security model that is further extended in order to incorporate key revocation. The security of our scheme reduces to the well-established strong Diffie-Hellman assumption. For this proof, we devise a multi-forking lemma, an extended version of the general forking lemma.
引用
收藏
页码:171 / 191
页数:21
相关论文
共 50 条
  • [21] Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance
    Xie, Congge
    Weng, Jian
    Zhou, Dehua
    INFORMATION SCIENCES, 2022, 594 : 249 - 263
  • [22] Revocable identity-based proxy re-signature against signing key exposure
    Yang, Xiaodong
    Chen, Chunlin
    Ma, Tingchun
    Wang, Jinli
    Wang, Caifen
    PLOS ONE, 2018, 13 (03):
  • [23] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [24] Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie-Hellman for wireless sensor networks
    Naresh, Vankamamidi S.
    Reddi, Sivaranjani
    Murthy, Nistala V. E. S.
    INFORMATION SECURITY JOURNAL, 2020, 29 (01): : 1 - 13
  • [25] Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices
    Xie, Congge
    Weng, Jian
    Wen, Jinming
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [26] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [27] An Efficient 3D Elliptic Curve Diffie-Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security
    Kumari, K. Anitha
    Sadasivam, G. Sudha
    Rohini, L.
    IETE JOURNAL OF RESEARCH, 2016, 62 (06) : 762 - 773
  • [28] Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
    Lee, Kwangsu
    IEEE ACCESS, 2023, 11 : 52636 - 52652
  • [29] Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions
    Seo, Jae Hong
    Emura, Keita
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1193 - 1205
  • [30] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    IEEE ACCESS, 2022, 10 : 44178 - 44199