Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
12-2018
Abstract
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique.
Keywords
Authenticated key exchange, CK model Key encapsulation mechanism
Discipline
Information Security
Research Areas
Cybersecurity
Areas of Excellence
Digital transformation
Publication
Proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security Brisbane, Australia, December 2-6
First Page
158
Last Page
189
ISBN
9783030033293
Identifier
10.1007/978-3-030-03329-3_6
Publisher
Springer
City or Country
Cham
Citation
XUE, Haiyang; LU, Xianhui; LI, Bao; LIANG, Bei; and HE, Jingnan.
Understanding and constructing AKE via double-key key encapsulation mechanism. (2018). Proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security Brisbane, Australia, December 2-6. 158-189.
Available at: https://ink.library.smu.edu.sg/sis_research/9206
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/978-3-030-03329-3_6