loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Kazuki Yoneyama

Affiliation: NTT Secure Platform Laboratories, Japan

Keyword(s): Authenticated Key Exchange, Hierarchical ID-based Authenticated Key Exchange, Exposure-resilience.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Identification, Authentication and Non-Repudiation ; Information and Systems Security

Abstract: ID-based authenticated key exchange (ID-AKE) is a cryptographic tool to establish a common session key between parties with authentication based on their IDs. If IDs contain some hierarchical structure such as an email address, hierarchical ID-AKE (HID-AKE) is especially suitable because of scalability. However, most of existing HID-AKE schemes do not satisfy advanced security properties such as forward secrecy, and the only known strongly secure HID-AKE scheme is inefficient. In this paper, we propose a new HID-AKE scheme which achieves both strong security and efficiency. We prove that our scheme is eCK-secure (which ensures maximal-exposure-resilience including forward secrecy) without random oracles, while existing schemes is proved in the random oracle model. Moreover, the number of messages and pairing operations are independent of the hierarchy depth; that is, really scalable and practical for a large-system.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.141.201.95

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yoneyama, K. (2013). Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles. In Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT; ISBN 978-989-8565-73-0; ISSN 2184-3236, SciTePress, pages 518-523. DOI: 10.5220/0004525705180523

@conference{secrypt13,
author={Kazuki Yoneyama.},
title={Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT},
year={2013},
pages={518-523},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004525705180523},
isbn={978-989-8565-73-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT
TI - Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles
SN - 978-989-8565-73-0
IS - 2184-3236
AU - Yoneyama, K.
PY - 2013
SP - 518
EP - 523
DO - 10.5220/0004525705180523
PB - SciTePress