Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/4785
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWu, Jiang-
dc.contributor.authorUstaoğlu, Berkant-
dc.date.accessioned2017-02-02T11:02:54Z-
dc.date.available2017-02-02T11:02:54Z-
dc.date.issued2009-
dc.identifier.citationWu, J., and Ustaoğlu, B. (2009). Efficient key exchange with tight security reduction. Cryptology ePrint Archive, Report 2009/288. http://eprint.iacr.org/2009/288en_US
dc.identifier.urihttp://eprint.iacr.org/2009/288-
dc.identifier.urihttp://hdl.handle.net/11147/4785-
dc.description.abstractIn this paper, we propose two authenticated key exchange (AKE) protocols, SMEN and SMEN−, which have efficient online computation and tight security proof in the extended Canetti-Krawczyk (eCK) model. SMEN takes 1.25 exponentiations in online computation, close to that (1.17 exponentiations) of the most efficient AKEs MQV and its variants HMQV and CMQV. SMEN has a security reduction as tight as that of NAXOS, which is the first AKE having a tight security reduction in the eCK model. As a comparison, MQV does not have a security proof; both HMQV and CMQV have a highly non-tight security reduction, and HMQV needs a non-standard assumption; NAXOS takes 2.17 exponentiations in online computation; NETS, a NAXOS variant, takes two online exponentiations in online computation. SMEN simultaneously achieves online efficiency and a tight security proof at a cost of 0.17 more exponentiations in offline computation and the restriction that one party is not allowed to establish a key with itself. SMEN− takes 1.29 exponentiations in online computation, but SMEN− does not use the static private key to compute the ephemeral public key (as does in SMEN, NAXOS, CMQV, and NETS), and hence reduces the risk of leaking the static private key.en_US
dc.language.isoenen_US
dc.publisherInternational Association for Cryptologic Researchen_US
dc.relation.ispartofCryptology ePrint Archiveen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectCryptographic protocolsen_US
dc.subjectAuthenticated key exchangeen_US
dc.subjectHMQVen_US
dc.subjectSMENen_US
dc.titleEfficient key exchange with tight security reductionen_US
dc.typeArticleen_US
dc.authoridTR102756en_US
dc.institutionauthorWu, Jiang-
dc.institutionauthorUstaoğlu, Berkant-
dc.departmentİzmir Institute of Technology. Mathematicsen_US
dc.identifier.volumeReport 2009/288en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
crisitem.author.dept04.02. Department of Mathematics-
Appears in Collections:Mathematics / Matematik
Files in This Item:
File Description SizeFormat 
4785.pdfMakale221.44 kBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

Page view(s)

184
checked on Nov 18, 2024

Download(s)

48
checked on Nov 18, 2024

Google ScholarTM

Check





Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.