File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-030-34578-5_11
- Scopus: eid_2-s2.0-85076714623
- WOS: WOS:000585084500011
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Strongly secure authenticated key exchange from supersingular isogenies
Title | Strongly secure authenticated key exchange from supersingular isogenies |
---|---|
Authors | |
Keywords | Post quantum Key encapsulation mechanism Authenticated key exchange Supersingular elliptic curve isogeny |
Issue Date | 2019 |
Publisher | Springer |
Citation | 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019. In Galbraith, S, Moriai, S (Eds), Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, p. 278-308. Cham, Switzerland: Springer, 2019. How to Cite? |
Abstract | © International Association for Cryptologic Research 2019. This paper aims to address the open problem, namely, to find new techniques to design and prove security of supersingular isogeny-based authenticated key exchange (AKE) protocols against the widest possible adversarial attacks, raised by Galbraith in 2018. Concretely, we present two AKEs based on a double-key PKE in the supersingular isogeny setting secure in the sense of CK+, one of the strongest security models for AKE. Our contributions are summarised as follows. Firstly, we propose a strong OW-CPA secure PKE, 2PKEsidh, based on SI-DDH assumption. By applying modified Fujisaki-Okamoto transformation, we obtain a [OW-CCA, OW-CPA] secure KEM, 2KEMsidh. Secondly, we propose a two-pass AKE, SIAKE2, based on SI-DDH assumption, using 2KEMsidh as a building block. Thirdly, we present a modified version of 2KEMsidh that is secure against leakage under the 1-Oracle SI-DH assumption. Using the modified 2KEMsidh as a building block, we then propose a three-pass AKE, SIAKE3, based on 1-Oracle SI-DH assumption. Finally, we prove that both SIAKE2 and SIAKE3 are CK+ secure in the random oracle model and supports arbitrary registration. We also provide an implementation to illustrate the efficiency of our schemes. Our schemes compare favourably against existing isogeny-based AKEs. To the best of our knowledge, they are the first of its kind to offer security against arbitrary registration, wPFS, KCI, and MEX simultaneously. Regarding efficiency, our schemes outperform existing schemes in terms of bandwidth as well as CPU cycle count. |
Persistent Identifier | http://hdl.handle.net/10722/280729 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID | |
Series/Report no. | Lecture Notes in Computer Science ; 11921 LNCS sublibrary. SL 4, Security and cryptology |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xu, Xiu | - |
dc.contributor.author | Xue, Haiyang | - |
dc.contributor.author | Wang, Kunpeng | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Tian, Song | - |
dc.date.accessioned | 2020-02-17T14:34:47Z | - |
dc.date.available | 2020-02-17T14:34:47Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019. In Galbraith, S, Moriai, S (Eds), Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, p. 278-308. Cham, Switzerland: Springer, 2019. | - |
dc.identifier.isbn | 9783030345778 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280729 | - |
dc.description.abstract | © International Association for Cryptologic Research 2019. This paper aims to address the open problem, namely, to find new techniques to design and prove security of supersingular isogeny-based authenticated key exchange (AKE) protocols against the widest possible adversarial attacks, raised by Galbraith in 2018. Concretely, we present two AKEs based on a double-key PKE in the supersingular isogeny setting secure in the sense of CK+, one of the strongest security models for AKE. Our contributions are summarised as follows. Firstly, we propose a strong OW-CPA secure PKE, 2PKEsidh, based on SI-DDH assumption. By applying modified Fujisaki-Okamoto transformation, we obtain a [OW-CCA, OW-CPA] secure KEM, 2KEMsidh. Secondly, we propose a two-pass AKE, SIAKE2, based on SI-DDH assumption, using 2KEMsidh as a building block. Thirdly, we present a modified version of 2KEMsidh that is secure against leakage under the 1-Oracle SI-DH assumption. Using the modified 2KEMsidh as a building block, we then propose a three-pass AKE, SIAKE3, based on 1-Oracle SI-DH assumption. Finally, we prove that both SIAKE2 and SIAKE3 are CK+ secure in the random oracle model and supports arbitrary registration. We also provide an implementation to illustrate the efficiency of our schemes. Our schemes compare favourably against existing isogeny-based AKEs. To the best of our knowledge, they are the first of its kind to offer security against arbitrary registration, wPFS, KCI, and MEX simultaneously. Regarding efficiency, our schemes outperform existing schemes in terms of bandwidth as well as CPU cycle count. | - |
dc.language | eng | - |
dc.publisher | Springer | - |
dc.relation.ispartof | Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science ; 11921 | - |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology | - |
dc.subject | Post quantum | - |
dc.subject | Key encapsulation mechanism | - |
dc.subject | Authenticated key exchange | - |
dc.subject | Supersingular elliptic curve isogeny | - |
dc.title | Strongly secure authenticated key exchange from supersingular isogenies | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-030-34578-5_11 | - |
dc.identifier.scopus | eid_2-s2.0-85076714623 | - |
dc.identifier.spage | 278 | - |
dc.identifier.epage | 308 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000585084500011 | - |
dc.publisher.place | Cham, Switzerland | - |
dc.identifier.issnl | 0302-9743 | - |