The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Pertukaran kunci disahkan berasaskan ID hierarki (HID-AKE) ialah protokol kriptografi untuk mewujudkan kunci sesi biasa antara pihak dengan pengesahan berdasarkan ID mereka dengan delegasi hierarki fungsi penjanaan kunci. Semua skim HID-AKE sedia ada adalah ID terpilih selamat, dan satu-satunya skema model standard yang diketahui bergantung pada andaian bukan standard seperti q-andaian jenis. Dalam makalah ini, kami mencadangkan pembinaan generik HID-AKE yang selamat ID suai dalam model HID-eCK (model keselamatan tahan pendedahan-pendedahan maksimum) tanpa oracle rawak. Salah satu contoh konkrit pembinaan generik kami mencapai skim HID-AKE selamat ID adaptif pertama di bawah (standard) kandaian -lin dalam model standard. Tambahan pula, ia mempunyai kelebihan bahawa kerumitan pengiraan operasi berpasangan dan eksponen serta kerumitan komunikasi tidak bergantung pada kedalaman hierarki. Juga, instantiasi konkrit lain mencapai skema HID-AKE pertama berdasarkan kekisi (iaitu, pasca-kuantum).
Ren ISHIBASHI
Ibaraki University
Kazuki YONEYAMA
Ibaraki University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Ren ISHIBASHI, Kazuki YONEYAMA, "Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles" in IEICE TRANSACTIONS on Fundamentals,
vol. E105-A, no. 9, pp. 1252-1269, September 2022, doi: 10.1587/transfun.2021DMP0002.
Abstract: Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2021DMP0002/_p
Salinan
@ARTICLE{e105-a_9_1252,
author={Ren ISHIBASHI, Kazuki YONEYAMA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles},
year={2022},
volume={E105-A},
number={9},
pages={1252-1269},
abstract={Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).},
keywords={},
doi={10.1587/transfun.2021DMP0002},
ISSN={1745-1337},
month={September},}
Salinan
TY - JOUR
TI - Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1252
EP - 1269
AU - Ren ISHIBASHI
AU - Kazuki YONEYAMA
PY - 2022
DO - 10.1587/transfun.2021DMP0002
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E105-A
IS - 9
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - September 2022
AB - Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical delegation of key generation functionality. All existing HID-AKE schemes are selective ID secure, and the only known standard model scheme relies on a non-standard assumption such as the q-type assumption. In this paper, we propose a generic construction of HID-AKE that is adaptive ID secure in the HID-eCK model (maximal-exposure-resilient security model) without random oracles. One of the concrete instantiations of our generic construction achieves the first adaptive ID secure HID-AKE scheme under the (standard) k-lin assumption in the standard model. Furthermore, it has the advantage that the computational complexity of pairing and exponentiation operations and the communication complexity do not depend on the depth of the hierarchy. Also, the other concrete instantiation achieves the first HID-AKE scheme based on lattices (i.e., post-quantum).
ER -