### Authenticated Key Distribution: When the Coupon Collector is Your Enemy

Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, and Peter Y. A. Ryan

##### Abstract

We introduce new authenticated key exchange protocols which on one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand are more efficient than distributing symmetric keys among the participants. To this end, we rely on a trusted central authority distributing key material which size is independent of the total number of users, and which allows the users to obtain shared secret keys. We analyze the security of our construction taking into account various attack models. Importantly, only symmetric primitives are needed in the protocol making it an alternative to quantum-safe key exchange protocols which rely on hardness assumptions.

Available format(s)
Category
Cryptographic protocols
Publication info
Published elsewhere. MINOR revision.SECITC 2019
Keywords
Symmetric cryptographykey exchange protocolauthenticationprovable securitypost-quantum cryptography.
Contact author(s)
maimut diana @ gmail com
History
2020-01-07: revised
See all versions
Short URL
https://ia.cr/2019/1499

CC BY

BibTeX

@misc{cryptoeprint:2019/1499,
author = {Marc Beunardeau and Fatima-Ezzahra El Orche and Diana Maimut and David Naccache and Peter B.  Roenne and Peter Y. A.  Ryan},
title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy},
howpublished = {Cryptology ePrint Archive, Paper 2019/1499},
year = {2019},
note = {\url{https://eprint.iacr.org/2019/1499}},
url = {https://eprint.iacr.org/2019/1499}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.