The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
L'échange de clés authentifié basé sur l'ID hiérarchique (HID-AKE) est un protocole cryptographique permettant d'établir une clé de session commune entre les parties avec une authentification basée sur leurs identifiants avec la délégation hiérarchique de la fonctionnalité de génération de clé. Tous les schémas HID-AKE existants sont sécurisés par une identification sélective, et le seul schéma de modèle standard connu repose sur une hypothèse non standard telle que q-hypothèse de type. Dans cet article, nous proposons une construction générique de HID-AKE qui est sécurisée par identification adaptative dans le modèle HID-eCK (modèle de sécurité résilient à exposition maximale) sans oracles aléatoires. L'une des instanciations concrètes de notre construction générique réalise le premier schéma HID-AKE sécurisé d'identification adaptative sous le (standard) k-lin dans le modèle standard. De plus, il présente l'avantage que la complexité informatique des opérations d'appariement et d'exponentiation et la complexité de la communication ne dépendent pas de la profondeur de la hiérarchie. De plus, l'autre instanciation concrète réalise le premier schéma HID-AKE basé sur des réseaux (c'est-à-dire post-quantique).
Ren ISHIBASHI
Ibaraki University
Kazuki YONEYAMA
Ibaraki University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Ren ISHIBASHI, Kazuki YONEYAMA, "Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles" in IEICE TRANSACTIONS on Fundamentals,
vol. E105-A, no. 9, pp. 1252-1269, September 2022, doi: 10.1587/transfun.2021DMP0002.
Abstract: Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2021DMP0002/_p
Copier
@ARTICLE{e105-a_9_1252,
author={Ren ISHIBASHI, Kazuki YONEYAMA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles},
year={2022},
volume={E105-A},
number={9},
pages={1252-1269},
abstract={Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).},
keywords={},
doi={10.1587/transfun.2021DMP0002},
ISSN={1745-1337},
month={September},}
Copier
TY - JOUR
TI - Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1252
EP - 1269
AU - Ren ISHIBASHI
AU - Kazuki YONEYAMA
PY - 2022
DO - 10.1587/transfun.2021DMP0002
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E105-A
IS - 9
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - September 2022
AB - Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
ER -