Department of Electrical Engineering, IIT Bombay
October 23, 2024
How can we define security of a key-exchange protocol?
Intuitively, a key-exchange protocol is secure if an adversary cannot distinguish between
The key-exchange experiment \textsf{KE}_{\mathcal{A},\Pi}^{\textsf{eav}}(n):
Two parties holding 1^n execute protocol \Pi. This results in a
A uniform bit b \in \{0,1\} is chosen.
\mathcal{A} is given \textsf{trans} and \hat{k}, and outputs a bit b'
The output of the experiment is defined to be 1 if b=b', and other 0 otherwise.
We modify the security definition a little
Let \widehat{KE}_{\mathcal{A}, \Pi}^{\textsf{eav}} denote the modified experiment
Theorem: If the DDH problem is hard relative to \mathcal{G}, then the Diffie-Hellman key-exchange protocol \Pi is secure in the presence of an eavesdropper