Proceedings of the 4th International Symposium on Information, Computer, and Communications Security 2009
DOI: 10.1145/1533057.1533101
|View full text |Cite
|
Sign up to set email alerts
|

An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem

Abstract: In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cash, Kiltz and Shoup. We show that our scheme is secure under bilinear Diffie-Hellman (BDH) assumption in the enhanced Canetti-Krawczyk (eCK) model, which better supports the adversary's queries than previous AKE models. To the best of our knowledge, our scheme is the first ID-based AKE protocol provably secure in eCK model.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 75 publications
(59 citation statements)
references
References 19 publications
0
59
0
Order By: Relevance
“…Most of previous ID-AKE schemes [CCS07,HC09,FG10,FSU10] are proved in the ROM. Moreover, though the generic construction of ID-AKE in [BCGNP08,BCGNP09] is secure in the StdM, its security is not proved in the id-CK + model.…”
Section: Pairing-based Instantiationsmentioning
confidence: 99%
“…Most of previous ID-AKE schemes [CCS07,HC09,FG10,FSU10] are proved in the ROM. Moreover, though the generic construction of ID-AKE in [BCGNP08,BCGNP09] is secure in the StdM, its security is not proved in the id-CK + model.…”
Section: Pairing-based Instantiationsmentioning
confidence: 99%
“…Examples for public key schemes applicable to this diagram would be NAXOS [LLM07] and CMQV [Ust08], an example for an ID-based scheme would be the ASIACCS09 [HC08] scheme. However, a combination of these schemes would not have any security guarantees about the dashed lines in the certificateless part of the diagram.…”
Section: Why a Natural Composition Of Cl-ake From Id-ake And Pk-ake Imentioning
confidence: 99%
“…See [CKS08], [HC08] for an explanation and a proof. Additionally we need the "Additive double BDH Trapdoor Test" and the "Multiplicative double BDH Trapdoor Test" for Strategy 9:…”
Section: The Twin Bilinear Diffie-hellman Trapdoor Theoremsmentioning
confidence: 99%
“…In NAXOS' approach no one is able to query the discrete logarithm of an ephemeral public key X without the pair (x, a); thus the discrete logarithm of X is hidden via an extra random oracle. Using NAXOS' approach many protocols [25,11,16,17] were argued secure in the eCK model under the random oracle assumption. In the standard model, the only (to our knowledge) eCK-secure protocol is due to Okamoto [22]; it uses pseudo-random functions instead of hash functions.…”
Section: Introductionmentioning
confidence: 99%