Cryptology ePrint Archive: Report 2008/344
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
Jooyoung Lee and Je Hong Park
Abstract: In this paper, we present a new authenticated key exchange(AKE)
protocol and prove its security under the random oracle assumption
and the computational Diffie-Hellman(CDH) assumption. In the
extended Canetti-Krawczyk model, there has been no known AKE
protocol based on the CDH assumption. Our protocol, called NAXOS+,
is obtained by slightly modifying the NAXOS protocol proposed by
LaMacchia, Lauter and Mityagin. We establish a formal security proof
of NAXOS+ in the extended Canetti-Krawczyk model using as a main
tool the trapdoor test presented by Cash, Kiltz and Shoup.
Category / Keywords: cryptographic protocols / authenticated key exchange, trapdoor test
Date: received 5 Aug 2008
Contact author: jlee05 at ensec re kr
Available format(s): PDF | BibTeX Citation
Version: 20080811:070358 (All versions of this report)
Short URL: ia.cr/2008/344
[ Cryptology ePrint archive ]