Efficient one-round key exchange in the efficient one-round key exchange in the standard model
Data(s) |
2009
|
---|---|
Resumo |
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model. |
Formato |
application/pdf |
Identificador | |
Publicador |
Inderscience Publishers |
Relação |
http://eprints.qut.edu.au/29294/1/29294.pdf DOI:10.1504/IJACT.2009.023466 Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. International Journal of Applied Cryptography, 1, pp. 181-199. |
Fonte |
Faculty of Science and Technology; School of Information Technology; Information Security Institute |
Palavras-Chave | #080402 Data Encryption #key exchange #standard model |
Tipo |
Journal Article |