Cryptology ePrint Archive: Report 2008/344

Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption

Jooyoung Lee and Je Hong Park

Abstract: In this paper, we present a new authenticated key exchange(AKE) protocol and prove its security under the random oracle assumption and the computational Diffie-Hellman(CDH) assumption. In the extended Canetti-Krawczyk model, there has been no known AKE protocol based on the CDH assumption. Our protocol, called NAXOS+, is obtained by slightly modifying the NAXOS protocol proposed by LaMacchia, Lauter and Mityagin. We establish a formal security proof of NAXOS+ in the extended Canetti-Krawczyk model using as a main tool the trapdoor test presented by Cash, Kiltz and Shoup.

Category / Keywords: cryptographic protocols / authenticated key exchange, trapdoor test

Date: received 5 Aug 2008

Contact author: jlee05 at ensec re kr

Available format(s): PDF | BibTeX Citation

Version: 20080811:070358 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]