Advertisement

Designs, Codes and Cryptography

, Volume 85, Issue 1, pp 175–178 | Cite as

A note on the strong authenticated key exchange with auxiliary inputs

  • Rongmao Chen
  • Yi Mu
  • Guomin Yang
  • Willy Susilo
  • Fuchun Guo
  • Yang Zheng
Correspondence

Abstract

Recently, Chen et al. proposed a framework for authenticated key exchange (AKE) protocols (referred to as CMYSG scheme) in Designs, Codes and Cryptography (available at http://link.springer.com/article/10.1007/s10623-016-0295-3). It is claimed that the proposed AKE protocol is secure in a new leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK). The main tool used for the generic construction is the smooth projective hash function (SPHF). In this note, we revisit the CMYSG scheme and point out a subtle flaw in the original security proof. Precisely, we show that the AI-LR-eCK security of the proposed construction cannot be successfully reduced to a pseudo-random SPHF and thus the CMYSG scheme is not secure as claimed. To restore the security proof, we replace the underlying typical SPHF with a 2-smooth SPHF, and show that such a replacement combined with a \(\pi \hbox {PRF}\) suffices to overcome the subtle flaw.

Keywords

Cryptanalysis Leakage resilient Key exchange Smooth projective hash function Auxiliary inputs 

Mathematics Subject Classification

94A60 14G50 

Notes

Acknowledgements

We would like to thank Colin Boyd for his helpful suggestions in improving this note.

References

  1. 1.
    Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strong authenticated key exchange with auxiliary input. Des. Codes Cryptogr. 1–29 (2016). doi: 10.1007/s10623-016-0295-3.
  2. 2.
    Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: CT-RSA, pp. 19–36 (2016).Google Scholar
  3. 3.
    Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strong authenticated key exchange with auxiliary inputs. Cryptology ePrint Archive, Report 2017/418. http://eprint.iacr.org/2017/418 (2017).
  4. 4.
    Okamoto T.: Authenticated key exchange and key encapsulation in the standard model. In: ASIACRYPT, pp. 474–484 (2007).Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Rongmao Chen
    • 1
  • Yi Mu
    • 2
  • Guomin Yang
    • 2
  • Willy Susilo
    • 2
  • Fuchun Guo
    • 2
  • Yang Zheng
    • 3
  1. 1.College of ComputerNational University of Defense TechnologyChangshaChina
  2. 2.School of Computing and Information TechnologyUniversity of WollongongWollongongAustralia
  3. 3.Department of Computer ScienceUniversity of HelsinkiHelsinkiFinland

Personalised recommendations