Understanding and constructing AKE via double-key key encapsulation mechanism

Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function...

Full description

Saved in:
Bibliographic Details
Main Authors: XUE, Haiyang, LU, Xianhui, LI, Bao, LIANG, Bei, HE, Jingnan
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9206
https://ink.library.smu.edu.sg/context/sis_research/article/10211/viewcontent/understanding_and_constructing.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10211
record_format dspace
spelling sg-smu-ink.sis_research-102112024-08-13T05:04:24Z Understanding and constructing AKE via double-key key encapsulation mechanism XUE, Haiyang LU, Xianhui LI, Bao LIANG, Bei HE, Jingnan Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9206 info:doi/10.1007/978-3-030-03329-3_6 https://ink.library.smu.edu.sg/context/sis_research/article/10211/viewcontent/understanding_and_constructing.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated key exchange CK model Key encapsulation mechanism Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Authenticated key exchange
CK model Key encapsulation mechanism
Information Security
spellingShingle Authenticated key exchange
CK model Key encapsulation mechanism
Information Security
XUE, Haiyang
LU, Xianhui
LI, Bao
LIANG, Bei
HE, Jingnan
Understanding and constructing AKE via double-key key encapsulation mechanism
description Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special type of KEM involving two pairs of secret-public keys and satisfying some function and security property. Such 2-key KEM serves as the core building block and provides alternative approaches to simplify the constructions of AKE. To see the usefulness of 2-key KEM, we show how several existing constructions of AKE can be captured as 2-key KEM and understood in a unified framework, including widely used HMQV, NAXOS, Okamoto-AKE, and FSXY12-13 schemes. Then, we show (1) how to construct 2-key KEM from concrete assumptions, (2) how to adapt the classical Fujisaki-Okamoto transformation and KEM combiner to achieve the security requirement of 2-key KEM, (3) an elegant Kyber-AKE over lattice using the improved Fujisaki-Okamoto technique.
format text
author XUE, Haiyang
LU, Xianhui
LI, Bao
LIANG, Bei
HE, Jingnan
author_facet XUE, Haiyang
LU, Xianhui
LI, Bao
LIANG, Bei
HE, Jingnan
author_sort XUE, Haiyang
title Understanding and constructing AKE via double-key key encapsulation mechanism
title_short Understanding and constructing AKE via double-key key encapsulation mechanism
title_full Understanding and constructing AKE via double-key key encapsulation mechanism
title_fullStr Understanding and constructing AKE via double-key key encapsulation mechanism
title_full_unstemmed Understanding and constructing AKE via double-key key encapsulation mechanism
title_sort understanding and constructing ake via double-key key encapsulation mechanism
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/9206
https://ink.library.smu.edu.sg/context/sis_research/article/10211/viewcontent/understanding_and_constructing.pdf
_version_ 1814047790997700608