[Resource Topic] 2008/344: Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption

Welcome to the resource topic for 2008/344

Title:
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption

Authors: Jooyoung Lee, Je Hong Park

Abstract:

In this paper, we present a new authenticated key exchange(AKE) protocol and prove its security under the random oracle assumption and the computational Diffie-Hellman(CDH) assumption. In the extended Canetti-Krawczyk model, there has been no known AKE protocol based on the CDH assumption. Our protocol, called NAXOS+, is obtained by slightly modifying the NAXOS protocol proposed by LaMacchia, Lauter and Mityagin. We establish a formal security proof of NAXOS+ in the extended Canetti-Krawczyk model using as a main tool the trapdoor test presented by Cash, Kiltz and Shoup.

ePrint: https://eprint.iacr.org/2008/344

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .