CryptoDB
Efficient One-round Key Exchange in the Standard Model
Authors: | |
---|---|
Download: | |
Abstract: | We consider one-round identity-based key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model. |
BibTeX
@misc{eprint-2008-17684, title={Efficient One-round Key Exchange in the Standard Model}, booktitle={IACR Eprint archive}, keywords={cryptographic protocols / key establishment, key encapsulation, id-based cryptography, standard model}, url={http://eprint.iacr.org/2008/007}, note={This is the full version of the paper appearing at ACISP 2008 j.gonzaleznieto@qut.edu.au 14006 received 3 Jan 2008, last revised 7 May 2008}, author={Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson}, year=2008 }