International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism

Authors:
Haiyang Xue
Xianhui Lu
Bao Li
Bei Liang
Jingnan He
Download:
DOI: 10.1007/978-3-030-03329-3_6
Search ePrint
Search Google
Presentation: Slides
Conference: ASIACRYPT 2018
Abstract: Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique.
BibTeX
@inproceedings{asiacrypt-2018-29162,
  title={Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism},
  booktitle={Advances in Cryptology – ASIACRYPT 2018},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={11273},
  pages={158-189},
  doi={10.1007/978-3-030-03329-3_6},
  author={Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He},
  year=2018
}