Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable

被引:0
|
作者
Nakagawa, Kohei [1 ]
Fujioka, Atsushi [2 ]
Nagai, Akira [1 ]
Tomida, Junichi [1 ]
Xagawa, Keita [3 ]
Yasuda, Kan [1 ]
机构
[1] NTT Corp, Tokyo, Japan
[2] Kanagawa Univ, Yokohama, Kanagawa, Japan
[3] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
来源
PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023 | 2023年 / 14168卷
关键词
Identity-based authenticated-key exchange; Revocable; Elliptic-curve cryptography; Pairing-free; Protocol implementations; ARM Cortex-M MCU; General forking lemma; Random oracle model; ENCRYPTION; PROTOCOL;
D O I
10.1007/978-3-031-44469-2_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is equipped with scalable key revocation. Our protocol builds upon the most efficient identity-based Diffie-Hellman key exchange (without revocation mechanisms) presented by Fiore and Gennaro at CT-RSA 2010, which can be constructed from pairing-free groups. The key revocation is essential for IB-AKE protocols in long-term practical operation. Our key revocation mechanism allows the key exchange protocol to remain comparable to the original Fiore-Gennaro identity-based key exchange, unlike other revocable schemes that require major (inefficient) modifications to their original IB-AKE protocols. Moreover, our revocation mechanism is scalable, in the sense that its computational cost is logarithmic, rather than linear, to the number of users. We provide a security proof in the identity-based extended Canetti-Krawczyk security model that is further extended in order to incorporate key revocation. The security of our scheme reduces to the well-established strong Diffie-Hellman assumption. For this proof, we devise a multi-forking lemma, an extended version of the general forking lemma.
引用
收藏
页码:171 / 191
页数:21
相关论文
共 50 条
  • [31] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [32] Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme
    Yang, Xiaodong
    Ma, Tingchun
    Yang, Ping
    An, Faying
    Wang, Caifen
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (03): : 575 - 587
  • [33] Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange
    Rivero-Garcia, Alexandra
    Santos-Gonzalez, Ivan
    Hernandez-Goya, Candelaria
    Caballero-Gil, Pino
    Yung, Moti
    SENSORS, 2017, 17 (04)
  • [34] One-round identity-based key exchange with Perfect Forward Security
    Xie, Min
    Wang, Libin
    INFORMATION PROCESSING LETTERS, 2012, 112 (14-15) : 587 - 591
  • [35] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [36] Communication-efficient revocable identity-based signature from multilinear maps
    Zhao, Jing
    Wei, Bin
    Su, Yang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 187 - 198
  • [37] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996
  • [38] Efficient and secure integration of renewable energy sources in smart grids using hybrid fuzzy neural network and improved Diffie-Hellman key management
    Vignesh, E.
    Jeyanthy, P. Aruna
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [39] Revocable Identity-Based Access Control for Big Data with Verifiable outsourced Computing
    Xiong, Hu
    Choo, Kim-Kwang Raymond
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) : 1 - 13
  • [40] Identity based distributed data storage using digital signature and diffie hellmann key exchange mechanism
    Allvijay, R.
    Sivagami, V.M.
    International Journal of Computers and Applications, 2014, 94 (14) : 27 - 30