International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Paper: An ID-based Authenticated Key Exchange Protocol based on Bilinear Diffie-Hellman Problem

Authors:
Hai huang
Zhenfu Cao
Download:
URL: http://eprint.iacr.org/2008/224
Search ePrint
Search Google
Abstract: In recent years, a great deal of ID-based authenticated key exchange protocols have been proposed. However, many of them have been broken or have no security proof. The main issue is that without static private key it is difficult for simulator to fully support the SessionKeyReveal and EphemeralKeyReveal queries. Some proposals which have purported to be provably secure just hold in relatively weak model, which does not fully support above-mentioned two queries. For protocols to be proven secure in more desirable model, people must make use of the stronger gap [15] assumption, which means that the computational problem remains hard even in the presence of an effective decision oracle. However, the gap assumption may not be acceptable at all, since the decision oracle, which the proofs rely on, may not exist in real world. Cash, Kiltz and Shoup [14] recently proposed a new computational problem called twin Diffie-Hellman problem, a nice feature of which not enjoyed by ordinary Diffie-Hellman problem is that the twin Diffie-Hellman problem remains hard, even with access to a decision oracle that recognizes solutions to the problem. At the heart of their method is the "trapdoor test" that allows us to implement an effective decision oracle for the twin Diffie-Hellman problem, without knowing the corresponding discrete logarithm. In this paper,we present a new ID-based authenticated key exchange (ID-AKE) protocol based on the trapdoor test technique. Compared with previous ID-AKE protocols, our proposal is based on the Bilinear Diffie-Hellman (BDH) assumption, which is more standard than Gap Bilinear Diffie-Hellman (GBDH) assumption, on which previous protocols are based. Moreover, our scheme is shown to be secure in the enhanced Canetti-Krawczyk (eCK) model, which is the currently strongest AKE security model.
BibTeX
@misc{eprint-2008-17901,
  title={An ID-based Authenticated Key Exchange Protocol based on Bilinear Diffie-Hellman Problem},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / ID-based, Authenticated key exchange, BDH problem, Provably secure},
  url={http://eprint.iacr.org/2008/224},
  note={ chinesechess@sjtu.edu.cn 14017 received 18 May 2008},
  author={Hai huang and Zhenfu Cao},
  year=2008
}