{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1390282681287655552.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1587/transfun.e96.a.1088"}},{"identifier":{"@type":"URI","@value":"https://www.jstage.jst.go.jp/article/transfun/E96.A/6/E96.A_1088/_pdf"}},{"identifier":{"@type":"DOI","@value":"10.1007/978-3-642-25141-2_3"}},{"identifier":{"@type":"NAID","@value":"10031193794"}}],"dc:title":[{"@language":"en","@value":"Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique"}],"dc:language":"en","description":[{"type":"abstract","notation":[{"@language":"en","@value":"This paper examines two-pass authenticated key exchange (AKE) protocols that are secure without the NAXOS technique under the gap Diffie-Hellman assumption in the random oracle model: FHMQV [18], KFU1 [21], SMEN<sup>-</sup> [13], and UP [17]. We introduce two protocol, <i>biclique DH protocol</i> and <i>multiplied biclique DH protocol</i>, to analyze the subject protocols, and show that the subject protocols use the multiplied biclique DH protocol as internal protocols. The biclique DH protocol is secure, however, the multiplied biclique DH protocol is insecure. We show the relations between the subject protocols from the viewpoint of how they overcome the insecurity of the multiplied biclique DH protocol: <br><br>·FHMQV virtually executes two multiplied biclique DH protocols in sequence with the same ephemeral key on two randomized static keys.<br>·KFU1 executes two multiplied biclique DH protocols in parallel with the same ephemeral key.<br>·UP is a version of KFU1 in which one of the static public keys is generated with a random oracle.<br>·SMEN<sup>-</sup> can be thought of as a combined execution of two multiplied biclique DH protocols. <br><br>In addition, this paper provides ways to characterize the AKE protocols and defines two parameters: one consists of the number of static keys, the number of ephemeral keys, and the number of shared secrets, and the other is defined as the total sum of these numbers. When an AKE protocol is constructed based on some group, these two parameters indicate the number of elements in the group, i.e., they are related to the sizes of the storage and communication data."}],"abstractLicenseFlag":"disallow"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1420564276164321920","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"50710159"},{"@type":"NRID","@value":"1000050710159"},{"@type":"NRID","@value":"9000018820969"},{"@type":"NRID","@value":"9000380483760"},{"@type":"NRID","@value":"9000388996815"},{"@type":"NRID","@value":"9000388992805"},{"@type":"NRID","@value":"9000263066599"},{"@type":"NRID","@value":"9000341538205"},{"@type":"NRID","@value":"9000388991789"},{"@type":"NRID","@value":"9000388995054"},{"@type":"NRID","@value":"9000380482693"},{"@type":"NRID","@value":"9000016323241"},{"@type":"NRID","@value":"9000019135065"},{"@type":"NRID","@value":"9000283209758"},{"@type":"NRID","@value":"9000341538770"},{"@type":"NRID","@value":"9000388991827"},{"@type":"NRID","@value":"9000019135063"},{"@type":"NRID","@value":"9000009186071"},{"@type":"NRID","@value":"9000341538602"},{"@type":"NRID","@value":"9000341538418"},{"@type":"NRID","@value":"9000388993146"},{"@type":"NRID","@value":"9000004373582"},{"@type":"NRID","@value":"9000004896162"},{"@type":"NRID","@value":"9000388996965"},{"@type":"NRID","@value":"9000283209755"},{"@type":"NRID","@value":"9000380483167"},{"@type":"NRID","@value":"9000259338968"},{"@type":"NRID","@value":"9000252921948"},{"@type":"NRID","@value":"9000380484064"},{"@type":"NRID","@value":"9000388992143"},{"@type":"NRID","@value":"9000396114599"},{"@type":"NRID","@value":"9000241960447"},{"@type":"NRID","@value":"9000388997933"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/7000028183"}],"foaf:name":[{"@language":"en","@value":"FUJIOKA Atsushi"}],"jpcoar:affiliationName":[{"@language":"en","@value":"NTT Secure Platform Laboratories, NTT Corporation"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"09168508"},{"@type":"EISSN","@value":"17451337"},{"@type":"NCID","@value":"AA10826239"}],"prism:publicationName":[{"@language":"en","@value":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"@language":"en","@value":"IEICE Trans. Fundamentals"}],"dc:publisher":[{"@language":"en","@value":"The Institute of Electronics, Information and Communication Engineers"},{"@language":"ja","@value":"一般社団法人 電子情報通信学会"}],"prism:publicationDate":"2013","prism:volume":"E96.A","prism:number":"6","prism:startingPage":"1088","prism:endingPage":"1099"},"reviewed":"false","url":[{"@id":"https://www.jstage.jst.go.jp/article/transfun/E96.A/6/E96.A_1088/_pdf"}],"availableAt":"2013","foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=two-pass%20authenticated%20key%20exchange","dc:title":"two-pass authenticated key exchange"},{"@id":"https://cir.nii.ac.jp/all?q=extended%20Canetti-Krawczyk%20security","dc:title":"extended Canetti-Krawczyk security"},{"@id":"https://cir.nii.ac.jp/all?q=gap%20Diffie-Hellman%20assumption","dc:title":"gap Diffie-Hellman assumption"},{"@id":"https://cir.nii.ac.jp/all?q=NAXOS%20technique","dc:title":"NAXOS technique"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360011144411854976","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"New directions in cryptography"}]},{"@id":"https://cir.nii.ac.jp/crid/1360011144763236224","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Random oracles are practical"}]},{"@id":"https://cir.nii.ac.jp/crid/1360011146153606656","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"An eCK-secure Authenticated Key Exchange Protocol Without Random Oracles"}]},{"@id":"https://cir.nii.ac.jp/crid/1360292620921911680","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Security Arguments for Digital Signatures and Blind Signatures"}]},{"@id":"https://cir.nii.ac.jp/crid/1360574095739172864","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"The Twin Diffie–Hellman Problem and Applications"}]},{"@id":"https://cir.nii.ac.jp/crid/1361981469206112128","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1362262943603726080","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"A New Efficient and Strongly Secure Authenticated Key Exchange Protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1363388843902483840","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem"}]},{"@id":"https://cir.nii.ac.jp/crid/1363670319630557696","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS"}]},{"@id":"https://cir.nii.ac.jp/crid/1363670320401227520","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Entity Authentication and Key Distribution"}]},{"@id":"https://cir.nii.ac.jp/crid/1363951794240181248","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@value":"Examining indistinguishability-based security models for key exchange protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1390001206311299072","@type":"Article","relationType":["references"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009749410618752","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Random oracles are practical : A paradigm for designing efficient protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009749410620032","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Key agreement protocols and their security analysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009749410622720","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An efficient key exchange protocol with a tight security reduction"}]},{"@id":"https://cir.nii.ac.jp/crid/1570009749410804992","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Entity authentication and key distribution"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291224387326592","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An eCK-secure authenticated key exchange protocol without random oracles"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291224387330432","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Session-stateReveal is stronger than eCK's EphemeralKeyReveal : Using automatic analysis to attack the NAXOS protocal"}]},{"@id":"https://cir.nii.ac.jp/crid/1570291224387331712","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Examining indistinguishability-based security models for key exchange protocols : The case of CK, CK-HMQV, AND eCK"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854174340749952","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854174340755584","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"New directions in cryptography"}]},{"@id":"https://cir.nii.ac.jp/crid/1571135649317459840","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Characterization if strongly secure authenticated key exchanges without NAXOS technique"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417124294168832","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Analysis of key-exchange protocols and their use for buiding secure channels"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417124294171136","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Stronger security of authenticated key exchange"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417124294172288","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Strongly secure anthenticated key exchange protocol based on computational Diffie-Hellman problem"}]},{"@id":"https://cir.nii.ac.jp/crid/1571698599270885888","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Strongly secure authenticated key exchange without NAXOS' approach under computational Diffie-Hellman assumption"}]},{"@id":"https://cir.nii.ac.jp/crid/1571698599270887936","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Authenitcated key exchange secure under the computational Diffie-Hellman assumption"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980074247597696","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The gap-problems : A new class of problems for the security of cryptographic schemse"}]},{"@id":"https://cir.nii.ac.jp/crid/1572261549224303232","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Auttenticated key exchange and key encapsulation in the standard model"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543024201014784","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Obtaining a secure and efficient key agreement protocol for (H) MQV and NAXOS"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543024201016960","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An eCK-secure authenticated dey exchange protocol without random oracles"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543024201018880","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The twin Diffie-Hellman problem and applications"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824499177728256","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Security arguments for signatures and blind signatures"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824499177729920","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Comparing SessionStateReveal and Ephemeral KeyReveal for Diffie-Hellman protocols"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824499177731200","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A new efficient and strongly secure authenticated key exchange protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668924107853440","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A new strongly secure authenticated key exchange protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668924107854720","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A secure and efficent authenticated Diffie-Hellman protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668924107857152","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"HMQV : A high-performance secure Diffie-Hellman protocol"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231874061282944","@type":"Article","relationType":["cites"]}],"dataSourceIdentifier":[{"@type":"JALC","@value":"oai:japanlinkcenter.org:1001954021"},{"@type":"CROSSREF","@value":"10.1587/transfun.e96.a.1088"},{"@type":"CIA","@value":"10031193794"},{"@type":"OPENAIRE","@value":"doi_dedup___::fb68fcb4d1a85f35b860d6d36f4c833d"}]}