Paper 2018/817

Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism

Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, and Jingnan He

Abstract

Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show 1) how to construct 2-key KEM from concrete assumptions, 2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, 3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique.

Note: Fix some typos

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in ASIACRYPT 2018
Keywords
Authenticated Key ExchangeCK ModelKey Encapsulation Mechanism
Contact author(s)
haiyangxc @ gmail com
History
2019-08-27: last of 9 revisions
2018-09-06: received
See all versions
Short URL
https://ia.cr/2018/817
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/817,
      author = {Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He},
      title = {Understanding and Constructing {AKE} via Double-key Key Encapsulation Mechanism},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/817},
      year = {2018},
      url = {https://eprint.iacr.org/2018/817}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.