Skip to main content
Erschienen in: Designs, Codes and Cryptography 1/2017

24.07.2017 | Correspondence

A note on the strong authenticated key exchange with auxiliary inputs

verfasst von: Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Yang Zheng

Erschienen in: Designs, Codes and Cryptography | Ausgabe 1/2017

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Chen et al. proposed a framework for authenticated key exchange (AKE) protocols (referred to as CMYSG scheme) in Designs, Codes and Cryptography (available at http://​link.​springer.​com/​article/​10.​1007/​s10623-016-0295-3). It is claimed that the proposed AKE protocol is secure in a new leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK). The main tool used for the generic construction is the smooth projective hash function (SPHF). In this note, we revisit the CMYSG scheme and point out a subtle flaw in the original security proof. Precisely, we show that the AI-LR-eCK security of the proposed construction cannot be successfully reduced to a pseudo-random SPHF and thus the CMYSG scheme is not secure as claimed. To restore the security proof, we replace the underlying typical SPHF with a 2-smooth SPHF, and show that such a replacement combined with a \(\pi \hbox {PRF}\) suffices to overcome the subtle flaw.
Literatur
1.
2.
Zurück zum Zitat Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: CT-RSA, pp. 19–36 (2016). Chen R., Mu Y., Yang G., Susilo W., Guo F.: Strongly leakage-resilient authenticated key exchange. In: CT-RSA, pp. 19–36 (2016).
4.
Zurück zum Zitat Okamoto T.: Authenticated key exchange and key encapsulation in the standard model. In: ASIACRYPT, pp. 474–484 (2007). Okamoto T.: Authenticated key exchange and key encapsulation in the standard model. In: ASIACRYPT, pp. 474–484 (2007).
Metadaten
Titel
A note on the strong authenticated key exchange with auxiliary inputs
verfasst von
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
Yang Zheng
Publikationsdatum
24.07.2017
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 1/2017
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-017-0386-9

Weitere Artikel der Ausgabe 1/2017

Designs, Codes and Cryptography 1/2017 Zur Ausgabe

Premium Partner