Understanding and constructing AKE via double-key key encapsulation mechanism
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9206 https://ink.library.smu.edu.sg/context/sis_research/article/10211/viewcontent/understanding_and_constructing.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10211 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-102112024-08-13T05:04:24Z Understanding and constructing AKE via double-key key encapsulation mechanism XUE, Haiyang LU, Xianhui LI, Bao LIANG, Bei HE, Jingnan Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9206 info:doi/10.1007/978-3-030-03329-3_6 https://ink.library.smu.edu.sg/context/sis_research/article/10211/viewcontent/understanding_and_constructing.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated key exchange CK model Key encapsulation mechanism Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Authenticated key exchange CK model Key encapsulation mechanism Information Security |
spellingShingle |
Authenticated key exchange CK model Key encapsulation mechanism Information Security XUE, Haiyang LU, Xianhui LI, Bao LIANG, Bei HE, Jingnan Understanding and constructing AKE via double-key key encapsulation mechanism |
description |
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique. |
format |
text |
author |
XUE, Haiyang LU, Xianhui LI, Bao LIANG, Bei HE, Jingnan |
author_facet |
XUE, Haiyang LU, Xianhui LI, Bao LIANG, Bei HE, Jingnan |
author_sort |
XUE, Haiyang |
title |
Understanding and constructing AKE via double-key key encapsulation mechanism |
title_short |
Understanding and constructing AKE via double-key key encapsulation mechanism |
title_full |
Understanding and constructing AKE via double-key key encapsulation mechanism |
title_fullStr |
Understanding and constructing AKE via double-key key encapsulation mechanism |
title_full_unstemmed |
Understanding and constructing AKE via double-key key encapsulation mechanism |
title_sort |
understanding and constructing ake via double-key key encapsulation mechanism |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/9206 https://ink.library.smu.edu.sg/context/sis_research/article/10211/viewcontent/understanding_and_constructing.pdf |
_version_ |
1814047790997700608 |