File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-030-03329-3_6
- Scopus: eid_2-s2.0-85057422217
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism
Title | Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism |
---|---|
Authors | |
Keywords | Authenticated key exchange CK model Key encapsulation mechanism |
Issue Date | 2018 |
Publisher | Springer |
Citation | 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018. In Peyrin, T, Galbraith, S. (Eds), Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, p. 158-189. Cham, Switzerland: Springer, 2018 How to Cite? |
Abstract | Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique. |
Persistent Identifier | http://hdl.handle.net/10722/312044 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
Series/Report no. | Lecture Notes in Computer Science ; volume 11273 LNCS sublibrary. SL 4, Security and Cryptology |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xue, Haiyang | - |
dc.contributor.author | Lu, Xianhui | - |
dc.contributor.author | Li, Bao | - |
dc.contributor.author | Liang, Bei | - |
dc.contributor.author | He, Jingnan | - |
dc.date.accessioned | 2022-04-06T04:32:03Z | - |
dc.date.available | 2022-04-06T04:32:03Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018. In Peyrin, T, Galbraith, S. (Eds), Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, p. 158-189. Cham, Switzerland: Springer, 2018 | - |
dc.identifier.isbn | 9783030033286 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/312044 | - |
dc.description.abstract | Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique. | - |
dc.language | eng | - |
dc.publisher | Springer | - |
dc.relation.ispartof | Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science ; volume 11273 | - |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and Cryptology | - |
dc.subject | Authenticated key exchange | - |
dc.subject | CK model | - |
dc.subject | Key encapsulation mechanism | - |
dc.title | Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-030-03329-3_6 | - |
dc.identifier.scopus | eid_2-s2.0-85057422217 | - |
dc.identifier.spage | 158 | - |
dc.identifier.epage | 189 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.publisher.place | Cham, Switzerland | - |