To overcome the above inefficiency, we propose a variant of HMQV protocol, denoted sHMQV, under some new design rationales which bring the following advantages: 1) eliminating the validation of the ephemeral public keys, which costs one exponentiation; 2) the power-limited trusted device only performs one exponentiation, which can be pre-computed offline; 3) all the online exponentiation computations can be performed in the powerful host. The above advantages make sHMQV enjoy better performance than HMQV and (s,r)OAKE, especially when deployed in the scenarios considered in this paper. We finally formally prove the security of sHMQV in the CK model.
Category / Keywords: cryptographic protocols / Authenticated Key Exchange, CK model, Security Analysis, Power-limited Devices Original Publication (with minor differences): ISPEC'15 Date: received 12 Feb 2015 Contact author: zqyzsj at gmail com Available format(s): PDF | BibTeX Citation Version: 20150224:022419 (All versions of this report) Short URL: ia.cr/2015/110 Discussion forum: Show discussion | Start new discussion