{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:35Z","timestamp":1767339875095,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Rabdan Academy, UAE"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages. To capture the malicious behaviors of the adversaries, there have been many efforts to define security models. Amongst them, the extended Canetti\u2013Krawczyk (eCK) security model is considered one of the strongest security models and has been widely adopted. In this paper, we present a simple construction of a pairing-based eCK-secure AKE protocol in the standard model. Our protocol can be instantiated with a suitable signature scheme (i.e., an existentially unforgeable signature scheme against adaptive chosen message attacks). The underlying assumptions of our construction are the decisional bilinear Diffie\u2013Hellman assumption and the existence of a pseudorandom function. Note that the previous eCK-secure protocol constructions either relied on random oracles for their security or used somewhat strong assumptions, such as the existence of strong-pseudorandom functions, target collision-resistant functions, etc., while our protocol construction uses fewer and more-standard assumptions in the standard model. Furthermore, preserving the same security argument, our protocol can be instantiated with any appropriate signature scheme that comes in the future with better efficiency.<\/jats:p>","DOI":"10.3390\/cryptography7010001","type":"journal-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T06:11:51Z","timestamp":1672899111000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9431-5836","authenticated-orcid":false,"given":"Janaka","family":"Alawatugoda","sequence":"first","affiliation":[{"name":"Research & Innovation Centers Division, Faculty of Resilience, Rabdan Academy, Abu Dhabi P.O. Box 114646, United Arab Emirates"},{"name":"Institute for Integrated and Intelligent Systems, Griffith University, Nathan, QLD 4111, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Rogaway, P. (1993, January 3\u20135). Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. Proceedings of the CCS\u201993, 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA.","DOI":"10.1145\/168588.168596"},{"key":"ref_3","unstructured":"Bellare, M., and Rogaway, P. (June, January 29). Provably secure session key distribution: The three party case. Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, Las Vegas, NV, USA."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Canetti, R. (2001, January 14\u201317). Universally Composable Security: A New Paradigm for Cryptographic Protocols. Proceedings of the FOCS, Las Vegas, NV, USA.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"LaMacchia, B., Lauter, K., and Mityagin, A. (2007, January 1\u20132). Stronger Security of Authenticated Key Exchange. Proceedings of the ProvSec, Wollongong, Australia.","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kim, M., Fujioka, A., and Ustaoglu, B. (2009, January 28\u201330). Strongly Secure Authenticated Key Exchange without NAXOS\u2019 Approach. Proceedings of the Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan.","DOI":"10.1007\/978-3-642-04846-3_12"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Moriyama, D., and Okamoto, T. (2009, January 11\u201313). An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. Proceedings of the Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China.","DOI":"10.1007\/978-3-642-04642-1_14"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10623-007-9159-1","article-title":"Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS","volume":"46","author":"Ustaoglu","year":"2008","journal-title":"Des. Codes Cryptogr."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yang, Z. (2013, January 20\u201322). Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model. Proceedings of the Information and Communications Security\u201415th International Conference, ICICS 2013, Beijing, China.","DOI":"10.1007\/978-3-319-02726-5_14"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Alawatugoda, J., Stebila, D., and Boyd, C. (2015, January 15\u201317). Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Proceedings of the Cryptography and Coding\u201415th IMA International Conference, IMACC 2015, Oxford, UK.","DOI":"10.1007\/978-3-319-27239-9_17"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s10207-016-0346-9","article-title":"Generic construction of an eCK -secure key exchange protocol in the standard model","volume":"16","author":"Alawatugoda","year":"2017","journal-title":"Int. J. Inf. Sec."},{"key":"ref_12","first-page":"484","article-title":"Strongly Secure Identity-Based Key Exchange with Single Pairing Operation","volume":"Volume 11736","author":"Sako","year":"2019","journal-title":"Proceedings of the Computer Security\u2014ESORICS 2019\u201424th European Symposium on Research in Computer Security, Luxembourg, 23\u201327 September 2019, Proceedings, Part II"},{"key":"ref_13","first-page":"156","article-title":"An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks","volume":"47","author":"Daniel","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1504\/IJAHUC.2019.097093","article-title":"Efficient two-party certificateless authenticated key agreement protocol under GDH assumption","volume":"30","author":"Xie","year":"2019","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"ref_15","first-page":"651","article-title":"Identity-Based Identity-Concealed Authenticated Key Exchange","volume":"Volume 12973","author":"Bertino","year":"2021","journal-title":"Proceedings of the Computer Security\u2014ESORICS 2021\u201426th European Symposium on Research in Computer Security, Darmstadt, Germany, 4\u20138 October 2021, Proceedings, Part II"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Katz, J., and Lindell, Y. (2007). Introduction to Modern Cryptography, Chapman and Hall\/CRC Press.","DOI":"10.1201\/9781420010756"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-Based Encryption from the Weil Pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"SIAM J. Comput."},{"key":"ref_18","first-page":"315","article-title":"Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption","volume":"Volume 8975","author":"Okamoto","year":"2015","journal-title":"Proceedings of the Financial Cryptography and Data Security\u201419th International Conference, FC 2015, San Juan, Puerto Rico, 26\u201330 January 2015, Revised Selected Papers"},{"key":"ref_19","first-page":"223","article-title":"Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles","volume":"Volume 3027","author":"Cachin","year":"2004","journal-title":"Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2\u20136 May 2004, Proceedings"},{"key":"ref_20","first-page":"477","article-title":"One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model","volume":"Volume 9020","author":"Bergsma","year":"2015","journal-title":"Proceedings of the Public-Key Cryptography\u2014PKC 2015\u201418th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, 30 March\u20131 April 2015, Proceedings"},{"key":"ref_21","unstructured":"Dutta, R., Barua, R., and Sarkar, P. (2004). Pairing-Based Cryptographic Protocols: A Survey. IACR Cryptol. ePrint Arch., 64. Available online: https:\/\/eprint.iacr.org\/2004\/064."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","article-title":"Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups","volume":"21","author":"Boneh","year":"2008","journal-title":"J. Cryptol."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:00:11Z","timestamp":1760119211000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,5]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["cryptography7010001"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7010001","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2023,1,5]]}}}