NAXOS

LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also described a protocol, called NAXOS, that enjoys a simple security proof in the new model. Compared to MQV and HMQV, NAXOS is less efficient and cannot be readily modified to obtain a one-pass protocol. On the other hand MQV does not have a security proof, and the HMQV security proof is extremely complicated. This paper proposes a new authenticated key agreement protocol, called CMQV (‘Combined’ MQV), which incorporates design principles from MQV, HMQV and AXOS. The new protocol achieves the efficiency of HMQV and admits a natural one-pass variant. Moreover, we present a relatively simple and intuitive proof that CMQV is secure in the LaMacchia-Lauter-Mityagin model.


References in zbMATH (referenced in 43 articles , 1 standard article )

Showing results 1 to 20 of 43.
Sorted by year (citations)

1 2 3 next

  1. Yang, Zheng; Li, Shuangqing: On security analysis of an after-the-fact leakage resilient key exchange protocol (2016)
  2. Cremers, Cas; Feltz, Michèle: Beyond eck: perfect forward secrecy under actor compromise and ephemeral-key reveal (2015)
  3. Fujioka, Atsushi; Suzuki, Koutarou; Xagawa, Keita; Yoneyama, Kazuki: Strongly secure authenticated key exchange from factoring, codes, and lattices (2015)
  4. Nose, Peter: Security weaknesses of a signature scheme and authenticated key agreement protocols (2014)
  5. Goldberg, Ian; Stebila, Douglas; Ustaoglu, Berkant: Anonymity and one-way authentication in key exchange protocols (2013)
  6. Fujioka, Atsushi; Suzuki, Koutarou; Xagawa, Keita; Yoneyama, Kazuki: Strongly secure authenticated key exchange from factoring, codes, and lattices (2012)
  7. He, Debiao; Padhye, Sahadeo; Chen, Jianhua: An efficient certificateless two-party authenticated key agreement protocol (2012)
  8. Jager, Tibor; Kohlar, Florian; Schäge, Sven; Schwenk, Jörg: On the security of TLS-DHE in the standard model (2012)
  9. Li, Hui; Wu, Chuankun: CMQV+: an authenticated key exchange protocol from CMQV (2012)
  10. Yoneyama, Kazuki: One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary (2012)
  11. Zhao, Jianjie; Gu, Dawu: Provably secure three-party password-based authenticated key exchange protocol (2012)
  12. Boyd, Colin; González Nieto, Juan: On forward secrecy in one-round key exchange (2011)
  13. Chatterjee, Sanjit; Menezes, Alfred; Ustaoglu, Berkant: A generic variant of NIST’S KAS2 key agreement protocol (2011)
  14. Cheng, Qingfeng; Ma, Chuangui: Analysis and improvement of an authenticated multiple key exchange protocol (2011)
  15. Fujioka, Atsushi; Suzuki, Koutarou: Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys (2011)
  16. Huang, Hai: Strongly secure one round authenticated key exchange protocol with perfect forward security (2011)
  17. Huang, Hai; Cao, Zhenfu: Blake-Wilson, Johnson & Menezes protocol revisited (2011)
  18. Ioannou, Lawrence M.; Mosca, Michele: A new spin on quantum cryptography: avoiding trapdoors and embracing public keys (2011)
  19. Ni, Liang; Chen, Gongliang; Li, Jianhua; Hao, Yanyan: Strongly secure identity-based authenticated key agreement protocols (2011)
  20. Pan, Jiaxin; Wang, Libin: TMQV: a strongly eck-secure Diffie-Hellman protocol without gap assumption (2011)

1 2 3 next