On session identifiers in provably secure protocols - The Bellare-Rogaway three-party key distribution protocol revisited

被引:0
|
作者
Choo, KKR [1 ]
Boyd, C [1 ]
Hitchcock, Y [1 ]
Maitland, G [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Technol, Brisbane, Qld 4001, Australia
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We examine the role of session identifiers (SIDs) in security proofs for key establishment protocols. After reviewing the practical importance of SIDs we use as a case study the three-party server-based key distribution (3PKD) protocol of Bellare and Rogaway, proven secure in 1995. We show incidentally that the partnership function used in the existing security proof is flawed. There seems to be no way to define a SID for the 3PKD protocol that will preserve the proof of security. A small change to the protocol allows a natural definition for a SID and we prove that the new protocol is secure using this SID to define partnering.
引用
收藏
页码:351 / 366
页数:16
相关论文
共 50 条
  • [1] Provably secure three-party authenticated quantum key distribution protocols
    Hwang, Tzonelih
    Lee, Kuo-Chang
    Li, Chuan-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (01) : 71 - 80
  • [2] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [3] Provably secure three-party password authenticated key exchange protocol in the standard model
    Yang, Jun-Han
    Cao, Tian-Jie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 340 - 350
  • [4] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [5] Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
    Fu, Jih-Ming
    Lin, Jeng-Ping
    Wang, Ren-Chiun
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2011, 8 (04): : 394 - 401
  • [6] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [7] Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
    Lai, Hong
    Orgun, Mehmet A.
    Xiao, Jinghua
    Pieprzyk, Josef
    Xue, Liyin
    Yang, Yixian
    NONLINEAR DYNAMICS, 2014, 77 (04) : 1427 - 1439
  • [8] Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
    Hong Lai
    Mehmet A. Orgun
    Jinghua Xiao
    Josef Pieprzyk
    Liyin Xue
    Yixian Yang
    Nonlinear Dynamics, 2014, 77 : 1427 - 1439
  • [9] Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
    Wang, Weijia
    Hu, Lei
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 118 - +
  • [10] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):