首页 | 本学科首页   官方微博 | 高级检索  
     


Provably secure authenticated key exchange protocol under the CDH assumption
Authors:Jianjie Zhao  Dawu Gu
Affiliation:a School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
b Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Abstract:Constructing a secure key exchange protocol is one of the most challenging problems in information security. We propose a provably secure two-round two-party authenticated key exchange (2AKE) protocol based on the well-studied CDH assumption in eCK model to provide the strongest definition of security for key exchange protocol when using the matching session to define the partnership. The underlying hardness assumption (CDH assumption) of our protocol is weaker than these of four other provably secure 2AKE protocols in CK model or eCK model and the computational cost of our protocol is reasonable. We also present a three-round variant of our protocol to realize key conformation.
Keywords:Cryptography  Authenticated key exchange  Provable security  eCK model  Key confirmation
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号