2007
DOI: 10.1007/s10623-007-9159-1
|View full text |Cite
|
Sign up to set email alerts
|

Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS

Abstract: LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that enjoys a simple security proof in the new model. Compared to MQV and HMQV, NAXOS is less efficient and cannot be readily modified to obtain a one-pass protocol. On the other hand MQV does not have a security proof, and the HMQV security proof is extremely complicated. This paper proposes a new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
93
1

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 124 publications
(94 citation statements)
references
References 13 publications
0
93
1
Order By: Relevance
“…In NAXOS' approach no one is able to query the discrete logarithm of an ephemeral public key X without the pair (x, a); thus the discrete logarithm of X is hidden via an extra random oracle. Using NAXOS' approach many protocols [25,11,16,17] were argued secure in the eCK model under the random oracle assumption. In the standard model, the only (to our knowledge) eCK-secure protocol is due to Okamoto [22]; it uses pseudo-random functions instead of hash functions.…”
Section: Introductionmentioning
confidence: 99%
“…In NAXOS' approach no one is able to query the discrete logarithm of an ephemeral public key X without the pair (x, a); thus the discrete logarithm of X is hidden via an extra random oracle. Using NAXOS' approach many protocols [25,11,16,17] were argued secure in the eCK model under the random oracle assumption. In the standard model, the only (to our knowledge) eCK-secure protocol is due to Okamoto [22]; it uses pseudo-random functions instead of hash functions.…”
Section: Introductionmentioning
confidence: 99%
“…These constructions are instantiated using existing schemes. In particular, we use existing OPKE protocols [26,32,22] to derive new signcryption KEMs with stronger security properties than the current signcryption KEMs. One of the main observations of our paper is that the security models for key establishment are stronger than those normally accepted for signcryption.…”
Section: Contributionsmentioning
confidence: 99%
“…The initial setup phase, the adversarial and communication models remain the same as defined for multi-pass key establishment protocols in the traditional public key setting. In independent work, Ustaoglu [32] defined a notion of freshness for OPKE protocols. We now present a slightly different notion.…”
Section: Security Model For Opkementioning
confidence: 99%
See 2 more Smart Citations