International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Efficient One-round Key Exchange in the Standard Model

Authors:
Colin Boyd
Yvonne Cliff
Juan M. Gonzalez Nieto
Kenneth G. Paterson
Download:
URL: http://eprint.iacr.org/2008/007
Search ePrint
Search Google
Abstract: We consider one-round identity-based key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
BibTeX
@misc{eprint-2008-17684,
  title={Efficient One-round Key Exchange in the Standard Model},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / key establishment, key encapsulation, id-based cryptography, standard model},
  url={http://eprint.iacr.org/2008/007},
  note={This is the full version of the paper appearing at ACISP 2008 j.gonzaleznieto@qut.edu.au 14006 received 3 Jan 2008, last revised 7 May 2008},
  author={Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson},
  year=2008
}