TY - GEN
T1 - One-Round Authenticated Group Key Exchange from Isogenies
AU - Fujioka, Atsushi
AU - Takashima, Katsuyuki
AU - Yoneyama, Kazuki
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - This paper proposes two one-round authenticated group key exchange protocols from newly employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle model and the other resists against maximum exposure where a non-trivial combination of secret keys is revealed. The security of the former (resp. latter) is proved under the n-way decisional (resp. n-way gap) Diffie–Hellman assumption on the CIMs in the quantum random (resp. random) oracle model. We instantiate the proposed protocols on the hard homogeneous spaces with limitation where the number of the user group is two. In particular, the protocols instantiated by using the CSIDH, commutative supersingular isogeny Diffie–Hellman, key exchange are currently more realistic than the general n-party CIM-based ones due to its realizability. Our two-party one-round protocols are secure against quantum adversaries.
AB - This paper proposes two one-round authenticated group key exchange protocols from newly employed cryptographic invariant maps (CIMs): one is secure in the quantum random oracle model and the other resists against maximum exposure where a non-trivial combination of secret keys is revealed. The security of the former (resp. latter) is proved under the n-way decisional (resp. n-way gap) Diffie–Hellman assumption on the CIMs in the quantum random (resp. random) oracle model. We instantiate the proposed protocols on the hard homogeneous spaces with limitation where the number of the user group is two. In particular, the protocols instantiated by using the CSIDH, commutative supersingular isogeny Diffie–Hellman, key exchange are currently more realistic than the general n-party CIM-based ones due to its realizability. Our two-party one-round protocols are secure against quantum adversaries.
KW - Commutative supersingular isogeny Diffie–Hellman
KW - Cryptographic invariant maps
KW - G-CK model
KW - G-CK model
KW - Hard homogeneous spaces
KW - One-round authenticated group key exchange
KW - Quantum adversary
UR - http://www.scopus.com/inward/record.url?scp=85075766099&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85075766099&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-31919-9_20
DO - 10.1007/978-3-030-31919-9_20
M3 - Conference contribution
AN - SCOPUS:85075766099
SN - 9783030319182
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 330
EP - 338
BT - Provable Security - 13th International Conference, ProvSec 2019, Proceedings
A2 - Steinfeld, Ron
A2 - Yuen, Tsz Hon
PB - Springer
T2 - 13th International Conference on Provable and Practical Security, ProvSec 2019
Y2 - 1 October 2019 through 4 October 2019
ER -