One-round key exchange in the standard model

Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
2009 International Journal of Applied Cryptography  
2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. Abstract. We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance
more » ... of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
doi:10.1504/ijact.2009.023466 fatcat:vkwc7duhwnfrzhnjjm3etxpa6y