A Framework for Authenticated Key Exchange in the Standard Model

  • Authors:
  • Shuhua Wu;Yuefei Zhu

  • Affiliations:
  • Department of Networks Engineering, Zhengzhou Information Science Technology Institute, Zhengzhou, China 450002;Department of Networks Engineering, Zhengzhou Information Science Technology Institute, Zhengzhou, China 450002

  • Venue:
  • ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We first introduce the new notion of the so-called target-independent smooth projective hashing (TISPHash) based on computationally-hiding commitments. Based on it and a class of pseudo-random functions (PRFs), we propose a framework for (PKI-based) authenticated key exchange protocols without random oracles and prove it to be secure in the (currently) strongest security definition, the extended Canetti-Krawczyk security definition. Our protocol is actually an abstraction of the efficient key exchange protocol of T. Okamoto. The abstracted protocol enjoys efficient instantiations from any secure encryption scheme that admits an efficient construction of TISPHash and allows a simple and intuitive understanding of its security. In some sense, our construction generalizes the design of T. Okamoto.