Authors
Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G Paterson
Publication date
2008
Conference
Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings 13
Pages
69-83
Publisher
Springer Berlin Heidelberg
Description
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Total citations
20072008200920102011201220132014201520162017201820192020202120222023202414101397116116975854101
Scholar articles
C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson - Information Security and Privacy: 13th Australasian …, 2008