NAXOS

LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that enjoys a simple security proof in the new model. Compared to MQV and HMQV, NAXOS is less efficient and cannot be readily modified to obtain a one-pass protocol. On the other hand MQV does not have a security proof, and the HMQV security proof is extremely complicated. This paper proposes a new authenticated key agreement protocol, called CMQV (‘Combined’ MQV), which incorporates design principles from MQV, HMQV and AXOS. The new protocol achieves the efficiency of HMQV and admits a natural one-pass variant. Moreover, we present a relatively simple and intuitive proof that CMQV is secure in the LaMacchia-Lauter-Mityagin model.


References in zbMATH (referenced in 81 articles , 1 standard article )

Showing results 1 to 20 of 81.
Sorted by year (citations)

1 2 3 4 5 next

  1. Alawatugoda, Janaka; Okamoto, Tatsuaki: Standard model leakage-resilient authenticated key exchange using inner-product extractors (2022)
  2. Hashimoto, Keitaro; Katsumata, Shuichi; Kwiatkowski, Kris; Prest, Thomas: An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure, and deniable (2022)
  3. Bindel, Nina; Stebila, Douglas; Veitch, Shannon: Improved attacks against key reuse in learning with errors key exchange (2021)
  4. Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas: Towards post-quantum security for signal’s X3DH handshake (2021)
  5. Davis, Hannah; Günther, Felix: Tighter proofs for the SIGMA and TLS 1.3 key exchange protocols (2021)
  6. de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia: Practical isogeny-based key-exchange with optimal tightness (2021)
  7. Deng, Lunzhi; Gao, Ronghai: Certificateless two-party authenticated key agreement scheme for smart grid (2021)
  8. Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas: A cryptographic analysis of the TLS 1.3 handshake protocol (2021)
  9. Ishibashi, Ren; Yoneyama, Kazuki: Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles (2021)
  10. Kawashima, Tomoki; Takashima, Katsuyuki; Aikawa, Yusuke; Takagi, Tsuyoshi: An efficient authenticated key exchange from random self-reducibility on CSIDH (2021)
  11. Taraskin, Oleg; Soukharev, Vladimir; Jao, David; LeGrow, Jason T.: Towards isogeny-based password-authenticated key establishment (2021)
  12. Chakraborty, Suvradip; Alawatugoda, Janaka; Rangan, Chandrasekaran Pandu: New approach to practical leakage-resilient public-key cryptography (2020)
  13. Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas: A formal security analysis of the Signal messaging protocol (2020)
  14. Daniel, Renu Mary; Rajsingh, Elijah Blessing; Silas, Salaja: An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries (2020)
  15. Meng, Keju; Miao, Fuyou; Yu, Yue: A secure and efficient on-line/off-line group key distribution protocol (2019)
  16. Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie: Strongly leakage resilient authenticated key exchange, revisited (2019)
  17. Feltz, Michèle; Cremers, Cas: Strengthening the security of authenticated key exchange against bad randomness (2018)
  18. Alawatugoda, Janaka: On the leakage-resilient key exchange (2017)
  19. Brzuska, Chris; Jacobsen, Håkon: A modular security analysis of EAP and IEEE 802.11 (2017)
  20. Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun: Strong authenticated key exchange with auxiliary inputs (2017)

1 2 3 4 5 next