Cryptology ePrint Archive: Report 2016/388

Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem

Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang

Abstract: Design secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach \cite{4} is used to hide the secret ephemeral key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks, (i) leaking of the static secret key which will be used in computing the exponent of the ephemeral public key. (ii) maximize of using random oracle when applying to the exponent of the ephemeral public key and session key derivation. In this paper, we present another AKE-secure without NAXOS approach based on decision linear assumption in the random oracle model. We fasten our security using games sequences tool which gives tight security for our protocol.

Category / Keywords: AKE, eCK model, NAXOS' approach, Decision Linear assumption

Date: received 17 Apr 2016, last revised 19 Apr 2016

Contact author: mmmmoj at hotmail com

Available format(s): PDF | BibTeX Citation

Note: Modified some mistyping errors

Version: 20160419:170301 (All versions of this report)

Short URL: ia.cr/2016/388

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]