higher-level parties. Unfortunately, above schemes
only partially satisfy collusion resistance; that is, if
greater numbers of SSKs in a level than a threshold
are compromised, a SSK of higher-level party is also
compromised.
There is the only existing HID-AKE scheme (Fu-
jioka et al., 2010) which satisfies both forward se-
crecy and collusion resistance. They formulate a
security model by extending the extended Canetti-
Krawzcyk (eCK) security model (LaMacchia et al.,
2007). We refer to their model as the HID-eCK
model. The HID-eCK model captures maximal-
exposure-resilience which means that an adversary
is allowed to obtain any non-trivial
1
combination of
MSK, SSKs, and ESKs individually. Thus, maximal-
exposure-resilience implies forward secrecy and col-
lusion resistance. Exposure of such secret keys may
be usually caused in real-world applications. A MSK
is exposed when the KGC is corrupted. A SSK
is revealed if an implementer is pretend to generate
SSKs in an insecure host machine in order to prevent
the randomness generation mechanisms in a tamper-
proof module such as a smart card. Also, if a pseudo-
random number generator implemented in a system is
poor, ESKs will be known to the adversary. There-
fore, to consider such a fail-safe security is very im-
portant to apply a cryptographic scheme to practical
systems.
Though the scheme (Fujioka et al., 2010) satisfies
strong security, there are two drawbacks. One is the
assumption. The security proof is given in the random
oracle (RO) model. A strong negative result (Canetti
et al., 1998; Canetti et al., 2004) is known for realiz-
ability of the RO. The other is efficiency. The number
of messages and pairing operations increases with de-
pending on the hierarchy depth. If we want to apply
this scheme in a large system, it will be impractical.
1.1 Our Contribution
In this paper, we propose the first HID-AKE scheme
resolving all problems of existing schemes. Our
scheme has several advantages compared with exist-
ing schemes. We show a comparison in Table 1.
Constant-size Overhead in Communication and
Computation. We construct our HID-AKE scheme
to use HIBE as a main building block. Though
the previous scheme (Fujioka et al., 2010) is also
1
If both the SSK and the ESK of a party in the target
session are revealed, the adversary trivially obtains the ses-
sion key for any scheme. Similarly, if both the MSK and
an ESK in the target session are revealed, the adversary also
trivially wins. This condition is defined as freshness.
constructed from an HIBE scheme (Gentry and Sil-
verberg, 2002), it inherits inefficiency of the HIBE
scheme; that is, the number of messages and pair-
ing operations depends on the hierarchy depth. On
the other hand, we use another HIBE scheme (Boneh
et al., 2005; Park and Lee, 2007) whose the number
of messages and pairing operations are constant-size.
Specifically, total messages sent by a party in a ses-
sion are only two group elements, and a signature and
a verification key of one-time signature. Total pair-
ing operations are only four times. Amazingly, our
scheme is more efficient in computation than (Fujioka
et al., 2010) when the hierarchy depth is higher than
2, while (Fujioka et al., 2010) is proved in the RO
model but our scheme can be proved without ROs.
Moreover, our scheme also becomes more efficient in
communication than (Fujioka et al., 2010) when the
hierarchy depth is higher than 7.
Maximal-Exposure-Resilience. We prove the se-
curity of our scheme in the HID-eCK model (Fu-
jioka et al., 2010). Since the HID-eCK model en-
sures maximal-exposure-resilience, our scheme satis-
fies such a strong security. A key technique to achieve
the HID-eCK security is the twisted pseudo-random
function (PRF) trick (Fujioka et al., 2012). This trick
can neutralize the effect of exposure of ESKs if SSKs
are not revealed. We can prevent an adversary to
obtain any information about a session key from re-
vealed ESKs with this trick. Moreover, we devise the
session key derivation procedure to include a shared
secret computed only from ESKs in the session as a
countermeasure to exposure of the MSK or SSKs. If
the MSK or all SSKs are exposed, the adversary can-
not know such a shared secret because she does not
know ESKs. For detailed discussion, please see Sec-
tion 3.1.
Security Proof without Random Oracles. All
(provably secure) existing schemes (Blundo et al.,
1998; Eschenauer and Gligor, 2002; Ramkumar et al.,
2005; Gennaro et al., 2008; Fujioka et al., 2010) use
ROs for deriving a session key. It makes security
proofs easy to understand because a simulator can ar-
bitrarily manage the value of session keys thanks to
the programmability of ROs in security reductions.
Conversely, without ROs, we must exactly simulate
session keys according to the protocol. Our solution
is applying a technique to simulate decryption queries
from the HIBE scheme (Park and Lee, 2007) with
the decisional bilinear Diffie-Hellman exponent (q-
DBDHE) assumption. We can manage session keys
correctly with this technique.
PracticalandExposure-resilientHierarchicalID-basedAuthenticatedKeyExchangewithoutRandomOracles
519