Efficient one-round key exchange in the standard model


Autoria(s): Boyd, Colin; Cliff, Yvonne; Gonzalez Nieto, Juan M.; Paterson, Kenneth G.
Data(s)

2008

Resumo

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/29291/

Publicador

Springer-Verlag

Relação

http://eprints.qut.edu.au/29291/1/ke_KEM-KEM_eprint_v1.7.pdf

DOI:10.1007/978-3-540-70500-0_6

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth G. (2008) Efficient one-round key exchange in the standard model. Lecture Notes in Computer Science, 5107, pp. 69-83.

Direitos

Copyright 2008 Springer

Fonte

Faculty of Science and Technology; School of Information Technology; Information Security Institute

Palavras-Chave #080402 Data Encryption #key exchange #standard model
Tipo

Journal Article