Sciweavers

ACISP
2008
Springer

Efficient One-Round Key Exchange in the Standard Model

14 years 1 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá
Added 18 Oct 2010
Updated 18 Oct 2010
Type Conference
Year 2008
Where ACISP
Authors Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson
Comments (0)