NAXOS

LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that enjoys a simple security proof in the new model. Compared to MQV and HMQV, NAXOS is less efficient and cannot be readily modified to obtain a one-pass protocol. On the other hand MQV does not have a security proof, and the HMQV security proof is extremely complicated. This paper proposes a new authenticated key agreement protocol, called CMQV (‘Combined’ MQV), which incorporates design principles from MQV, HMQV and AXOS. The new protocol achieves the efficiency of HMQV and admits a natural one-pass variant. Moreover, we present a relatively simple and intuitive proof that CMQV is secure in the LaMacchia-Lauter-Mityagin model.


References in zbMATH (referenced in 67 articles , 1 standard article )

Showing results 1 to 20 of 67.
Sorted by year (citations)

1 2 3 4 next

  1. Meng, Keju; Miao, Fuyou; Yu, Yue: A secure and efficient on-line/off-line group key distribution protocol (2019)
  2. Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie: Strongly leakage resilient authenticated key exchange, revisited (2019)
  3. Feltz, Michèle; Cremers, Cas: Strengthening the security of authenticated key exchange against bad randomness (2018)
  4. Alawatugoda, Janaka: On the leakage-resilient key exchange (2017)
  5. Brzuska, Chris; Jacobsen, Håkon: A modular security analysis of EAP and IEEE 802.11 (2017)
  6. Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun: Strong authenticated key exchange with auxiliary inputs (2017)
  7. Günther, Felix; Hale, Britta; Jager, Tibor; Lauer, Sebastian: 0-RTT key exchange with full forward secrecy (2017)
  8. Jager, Tibor; Kohlar, Florian; Schäge, Sven; Schwenk, Jörg: Authenticated confidential channel establishment and the security of TLS-DHE (2017)
  9. Tian, Yangguang; Yang, Guomin; Mu, Yi; Zhang, Shiwei; Liang, Kaitai; Yu, Yong: One-round attribute-based key exchange in the multi-party setting (2017)
  10. Zhou, Limin; Lv, Fengju: A simple provably secure AKE from the LWE problem (2017)
  11. Coron, Jean-Sébastien: Security analysis of the modular enhanced symmetric role authentication (mERA) protocol (2016)
  12. Kılınç, Handan; Vaudenay, Serge: Efficient public-key distance bounding protocol (2016)
  13. Ni, Liang; Chen, Gongliang; Li, Jianhua; Hao, Yanyan: Strongly secure identity-based authenticated key agreement protocols without bilinear pairings (2016)
  14. Tian, Yangguang; Yang, Guomin; Mu, Yi; Liang, Kaitai; Yu, Yong: One-round attribute-based key exchange in the multi-party setting (2016)
  15. Xie, Yong; Wu, Libing; Zhang, Yubo; Xu, Zhiyan: Strongly secure two-party certificateless key agreement protocol with short message (2016)
  16. Yang, Zheng; Li, Shuangqing: On security analysis of an after-the-fact leakage resilient key exchange protocol (2016)
  17. Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin: Continuous after-the-fact leakage-resilient eCK-secure key exchange (2015)
  18. Cremers, Cas; Feltz, Michèle: Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (2015)
  19. Dousti, Mohammad Sadeq; Jalili, Rasool: FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes (2015)
  20. Fujioka, Atsushi; Suzuki, Koutarou; Xagawa, Keita; Yoneyama, Kazuki: Strongly secure authenticated key exchange from factoring, codes, and lattices (2015)

1 2 3 4 next