作者
Colin Boyd, Yvonne Cliff, Juan M Gonzalez Nieto, Kenneth G Paterson
发表日期
2009/1/1
期刊
International Journal of Applied Cryptography
卷号
1
期号
3
页码范围
181-199
出版商
Inderscience Publishers
简介
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how Key-Encapsulation Mechanisms (KEMs) can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the Random Oracle Model.
引用总数
2010201120122013201420152016201720182019202020212022202320243445972415411
学术搜索中的文章
C Boyd, Y Cliff, JMG Nieto, KG Paterson - International Journal of Applied Cryptography, 2009