On session identifiers in provably secure protocols - The Bellare-Rogaway three-party key distribution protocol revisited

被引:0
|
作者
Choo, KKR [1 ]
Boyd, C [1 ]
Hitchcock, Y [1 ]
Maitland, G [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Technol, Brisbane, Qld 4001, Australia
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We examine the role of session identifiers (SIDs) in security proofs for key establishment protocols. After reviewing the practical importance of SIDs we use as a case study the three-party server-based key distribution (3PKD) protocol of Bellare and Rogaway, proven secure in 1995. We show incidentally that the partnership function used in the existing security proof is flawed. There seems to be no way to define a SID for the 3PKD protocol that will preserve the proof of security. A small change to the protocol allows a natural definition for a SID and we prove that the new protocol is secure using this SID to define partnering.
引用
收藏
页码:351 / 366
页数:16
相关论文
共 50 条
  • [31] Comment on “A practical protocol for three-party authenticated quantum key distribution”
    Yi-Ping Luo
    Wen-Han Chou
    Tzonelih Hwang
    Quantum Information Processing, 2017, 16
  • [32] Three-party reference frame independent quantum key distribution protocol
    Comfort Sekga
    Mhlambululi Mafu
    Chinese Physics B, 2021, 30 (12) : 61 - 71
  • [33] Comment on "A practical protocol for three-party authenticated quantum key distribution"
    Luo, Yi-Ping
    Chou, Wen-Han
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2017, 16 (05)
  • [34] Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
    Gao, Fei
    Qin, Su-Juan
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) : 630 - 635
  • [35] Three-party reference frame independent quantum key distribution protocol*
    Sekga, Comfort
    Mafu, Mhlambululi
    CHINESE PHYSICS B, 2021, 30 (12)
  • [36] Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
    Marin-Lopez, R.
    Pereniguez, F.
    Bernal, F.
    Gomez, A. F.
    COMPUTER NETWORKS, 2010, 54 (15) : 2651 - 2673
  • [37] A secure and efficient three-party password-based authenticated key exchange protocol
    He, Yong-Zhong
    Cai, Ying
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 280 - +
  • [38] Provably secure three-factor authentication and key agreement scheme for session initiation protocol
    Challa, Sravani
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Wu, Fan
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5412 - 5431
  • [39] A Smart Card-Based Three-Party Quantum Key Distribution Protocol
    Wijayantol, Heri
    Chen, Hsing-Chung
    Lin, Wen Yen
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 291 - 301
  • [40] A Provably Secure Three-Party Password Authenicated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems
    Wei, Fushan
    Ma, Jianfeng
    Ge, Aijun
    Li, Guangsong
    Ma, Chuangui
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (02): : 195 - 205