Academic Journals Database
Disseminating quality controlled scientific knowledge

TUP: A New eCK-Secure AKE Protocol under the CDH Assumption

Author(s): Qinglei Zhou | Zengfu Yang

Journal: International Journal of Communications, Network and System Sciences
ISSN 1913-3715

Volume: 05;
Issue: 06;
Start page: 332;
Date: 2012;
Original page

Keywords: Authenticated Key Exchange | Provable Security | eCK Model | Computational Diffie-Hellman Assumption | Trapdoor Test

The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions