• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An eCK-secure Authenticated Key Exchange Protocol without Random Oracles

Vol. 5, No. 3, March 30, 2011
10.3837/tiis.2011.03.009, Download Paper (Free):

Abstract

Two-party key exchange protocol is a mechanism in which two parties communicate with each other over an insecure channel and output the same session key. A key exchange protocol that is secure against an active adversary who can control and modify the exchanged messages is called authenticated key exchange (AKE) protocol. LaMacchia, Lauter and Mityagin presented a strong security definition for public key infrastructure (PKI) based two-pass protocol, which we call the extended Canetti-Krawczyk (eCK) security model, and some researchers have provided eCK-secure AKE protocols in recent years. However, almost all protocols are provably secure in the random oracle model or rely on a special implementation technique so-called the NAXOS trick. In this paper, we present a PKI-based two-pass AKE protocol that is secure in the eCK security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and does not rely on implementation techniques such as the NAXOS trick.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
D. Moriyama and T. Okamoto, "An eCK-secure Authenticated Key Exchange Protocol without Random Oracles," KSII Transactions on Internet and Information Systems, vol. 5, no. 3, pp. 607-625, 2011. DOI: 10.3837/tiis.2011.03.009.

[ACM Style]
Daisuke Moriyama and Tatsuaki Okamoto. 2011. An eCK-secure Authenticated Key Exchange Protocol without Random Oracles. KSII Transactions on Internet and Information Systems, 5, 3, (2011), 607-625. DOI: 10.3837/tiis.2011.03.009.

[BibTeX Style]
@article{tiis:19949, title="An eCK-secure Authenticated Key Exchange Protocol without Random Oracles", author="Daisuke Moriyama and Tatsuaki Okamoto and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2011.03.009}, volume={5}, number={3}, year="2011", month={March}, pages={607-625}}