One-round protocols for two-party authenticated key exchange

Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingChapter

    78 Citations (Scopus)

    Abstract

    Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be possible to design protocols with improved latency. This is the focus of the present work. We present a number of provably-secure protocols for two-party authenticated key exchange (AKE) which require only a single round. Our first protocol provides key independence only, and is analyzed in the random oracle model. This scheme matches the most efficient AKE protocols among those found in the literature. Our second scheme additionally provides forward secrecy, and is also analyzed in the random oracle model. Our final protocol provides the same strong security guarantees, but is proven secure in the standard model. This scheme is only slightly less efficient (from a computational perspective) than the previous ones. These last two schemes are the first provably-secure one-round protocols for authenticated 2-party key exchange which provide forward secrecy.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    EditorsMarkus Jakobsson, Moti Yung, Jianying Zhou
    PublisherSpringer Verlag
    Pages220-232
    Number of pages13
    ISBN (Print)3540222170, 9783540222170
    DOIs
    Publication statusPublished - 2004

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume3089
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Keywords

    • Authenticated key exchange
    • Diffie-Hellman key exchange
    • Forward secrecy
    • Round complexity

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'One-round protocols for two-party authenticated key exchange'. Together they form a unique fingerprint.

    Cite this