[Resource Topic] 2018/817: Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism

Welcome to the resource topic for 2018/817

Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism

Authors: Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He


Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show 1) how to construct 2-key KEM from concrete assumptions, 2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, 3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique.

ePrint: https://eprint.iacr.org/2018/817

Slides: https://asiacrypt.iacr.org/2018/files/SLIDES/TUESDAY/514/Understanding AKE - simple.pdf

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .