ICA3PP 2009: Algorithms and Architectures for Parallel Processing pp 226-233 | Cite as
Authenticated Key Exchange Protocol in One-Round
Abstract
The Key-exchange protocol is one of the most basic and widely used cryptographic protocols in internet for secure communication. In a two-party setting, cryptographic protocol design has often ignored the possibility of simultaneous message transmission by each of the two parties. Most protocols for two-party have been designed assuming that parties alternate sending their messages. We present two provably-secure protocols for two-party authenticated key exchange (AKE) which require not only a single round, but more efficient message transmission (from a computational perspective). The protocol provides Implicit Authentication, key independence and forward secrecy, and is analyzed in the standard model. The protocols are the first provably-secure one-round protocol for authenticated 2-party key exchange in the standard model that the message lengths are equal to the basic protocol.
Keywords
Authenticated key exchange Forward secrecy Round complexity Diffie-Hellman key exchangePreview
Unable to display preview. Download preview PDF.
References
- 1.Ankney, R., Johnson, D., Matyas, M.: The Unified Model. Contribution to ANSI X9F1 (October 1995)Google Scholar
- 2.Ateniese, G., Steiner, M., Tsudik, G.: New Multi-Party Authentication Services and Key Agreement Protocols. IEEE Journal of Selected Areas in Communications 18(4), 628–639 (2000)CrossRefGoogle Scholar
- 3.Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Proc. 30th Annual Symposium on the Theory of Computing, pp. 419–428. ACM Press, New York (1998)Google Scholar
- 4.Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220–232. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 5.Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic Design of Two-Party Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5), 679–693 (1993)CrossRefGoogle Scholar
- 6.Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Sixth IMA International Conference on Cryptography and Coding, vol. 1335, pp. 30–45. ACM, New York (1997)Google Scholar
- 7.Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. Selected Areas in Cryptography. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)CrossRefGoogle Scholar
- 8.Boyd, C.: On Key Agreement and Conference Key Agreement. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 294–302. Springer, Heidelberg (1997)CrossRefGoogle Scholar
- 9.Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2003)CrossRefGoogle Scholar
- 10.Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 11.Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)CrossRefGoogle Scholar
- 12.Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: ACM Conference on Computer and Communications Security, pp. 255–264 (2001)Google Scholar
- 13.Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. J. Cryptology 20, 85–113 (2007)MathSciNetCrossRefMATHGoogle Scholar
- 14.Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337–351. Springer, Heidelberg (2002)CrossRefGoogle Scholar
- 15.Denning, D., Sacco, G.M.: Timestamps in Key Distribution Protocols. Comm. ACM 24(8), 533–536 (1981)CrossRefGoogle Scholar
- 16.Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetCrossRefMATHGoogle Scholar
- 17.Diffie, W., van Oorschot, P., Wiener, M.: Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography 2(2), 107–125 (1992)MathSciNetCrossRefGoogle Scholar
- 18.Ingemarasson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution System. IEEE Transactions on Information Theory 28(5), 714–720 (1982)MathSciNetCrossRefMATHGoogle Scholar
- 19.Shoup, V.: Lower Bounds for Discrete Logarithms and Related Problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256–266. Springer, Heidelberg (1997)CrossRefGoogle Scholar
- 20.Just, M., Vaudenay, S.: Authenticated Multi-Party Key Agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 36–49. Springer, Heidelberg (1996)CrossRefGoogle Scholar
- 21.Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
- 22.Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An Efficient Protocol for Authenticated Key Agreement. Technical report CORR 98-05, University of Waterloo (1988)Google Scholar
- 23.Matsumoto, T., Takashima, Y., Imai, H.: On Seeking Smart Public-Key Distribution Systems. The Transactions of the IECE of Japan E69, 99–106 (1986)Google Scholar
- 24.National Security Agency. SKIPJACK and KEA algorithm specification. Version 2.0, May 29 (1998)Google Scholar
- 25.Shoup, V.: On Formal Models for Secure Key Exchange, http://eprint.iacr.org
- 26.Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: ACM Conference on Computer and Communications Security, pp. 31–37 (1996)Google Scholar
- 27.Tzeng, W.-G.: A Practical and Secure-Fault-Tolerant Conference-Key Agreement Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 1–13. Springer, Heidelberg (2000)CrossRefGoogle Scholar