Title :
Privacy-Preserving Authenticated Key-Exchange Over Internet
Author :
Yao, Andrew Chi-Chih ; Yunlei Zhao
Author_Institution :
Inst. for Interdiscipl. Inf. Sci., Tsinghua Univ., Beijing, China
Abstract :
Key-exchange, in particular Diffie-Hellman key-exchange (DHKE), is among the core cryptographic mechanisms for ensuring network security. For key-exchange over the Internet, both security and privacy are desired. In this paper, we develop a family of privacy-preserving authenticated DHKE protocols named deniable Internet key-exchange (DIKE), both in the traditional PKI setting and in the identity-based setting. The newly developed DIKE protocols are of conceptual clarity and practical (online) efficiency. They provide useful privacy protection to both protocol participants, and add novelty and new value to the IKE standard. To the best of our knowledge, our protocols are the first provably secure DHKE protocols that additionally enjoy all the following privacy protection advantages: 1) forward deniability, actually concurrent non-malleable statistical zero-knowledge, for both protocol participants simultaneously; 2) the session transcript and session-key can be generated merely from DH-exponents (together with some public values), which thus cannot be traced to the pair of protocol participants; and 3) exchanged messages do not bear peer´s identity, and do not explicitly bear player role information.
Keywords :
Internet; computer network security; cryptographic protocols; data privacy; public key cryptography; DH-exponents; DIKE; Diffie-Hellman key-exchange; IKE standard; Internet; PKI setting; cryptographic mechanisms; deniable Internet key-exchange; forward deniability; identity-based setting; network security; nonmalleable statistical zero-knowledge; privacy protection; privacy-preserving authenticated DHKE protocols; privacy-preserving authenticated key-exchange; session transcript; session-key; Internet; Levee; Privacy; Protocols; Public key; Standards; Authentication; Diffie–Hellman; deniability; key exchange; privacy; restricted random oracle; security;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2013.2293457