1

After reading different techniques to achieve authenticated key-agreement (X3DH, HMQV, Asynchronous Ratcheting tree, An efficient protocol for authenticated key agreement, I understood that all these approaches enforce implicit authentication --Alice is sure that only a specifically identified Bob can derive the same key -- explicit authentication is enforced by they use of a trusted server or digital certificates, which are parts of Public key infrastructures (PKIs).

As an alternative to PKIs, I learned that PAKE (password-authenticated key exchange) can be used. However, those schemes usually assume parties involved in the key-agreement already have a pre-shared password, or one party has the password and the other has enough information to recognize the password [Do all pake assume that all parties already have a password?]

However, I want to achieve a key-agreement without relying on PKIs or pre-shared secrets.

Hence is there a way to perform a key-agreement resistant to a man in the middle attack without the use of PKIs or pre-shared secret?

vxek
  • 551
  • 3
  • 10

0 Answers0