Provably Secure Authenticated Key Exchange Protocol under the CDH Assumption

Jianjie Zhao,Dawu Gu
DOI: https://doi.org/10.1016/j.jss.2010.07.010
2010-01-01
Abstract:Constructing a secure key exchange protocol is one of the most challenging problems in information security. We propose a provably secure two-round two-party authenticated key exchange (2AKE) protocol based on the well-studied CDH assumption in eCK model to provide the strongest definition of security for key exchange protocol when using the matching session to define the partnership. The underlying hardness assumption (CDH assumption) of our protocol is weaker than these of four other provably secure 2AKE protocols in CK model or eCK model and the computational cost of our protocol is reasonable. We also present a three-round variant of our protocol to realize key conformation.
What problem does this paper attempt to address?