On session identifiers in provably secure protocols - The Bellare-Rogaway three-party key distribution protocol revisited

被引:0
|
作者
Choo, KKR [1 ]
Boyd, C [1 ]
Hitchcock, Y [1 ]
Maitland, G [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Technol, Brisbane, Qld 4001, Australia
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We examine the role of session identifiers (SIDs) in security proofs for key establishment protocols. After reviewing the practical importance of SIDs we use as a case study the three-party server-based key distribution (3PKD) protocol of Bellare and Rogaway, proven secure in 1995. We show incidentally that the partnership function used in the existing security proof is flawed. There seems to be no way to define a SID for the 3PKD protocol that will preserve the proof of security. A small change to the protocol allows a natural definition for a SID and we prove that the new protocol is secure using this SID to define partnering.
引用
收藏
页码:351 / 366
页数:16
相关论文
共 50 条
  • [41] Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting
    Wu, Shuhua
    Zhu, Yuefei
    Network and Parallel Computing, 2008, 5245 : 105 - 115
  • [42] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    PLOS ONE, 2020, 15 (04):
  • [43] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols
    Wang, Weijia
    Hu, Lei
    Li, Yong
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +
  • [44] Looking for diamonds in the desert - Extending automatic protocol generation to three-party authentication and key agreement protocols
    Perrig, A
    Song, D
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 64 - 76
  • [45] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [46] A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service
    Li, Chun-Ta
    Lee, Chin-Wen
    Shen, Jau-Ji
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 31 - 36
  • [47] A Stronger Formal Security Model of Three-party Authentication and Key Distribution Protocol for 802.11i
    Tao Wenjun
    Hu Bin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 163 - 173
  • [48] A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement
    Hong Lai
    Mingxing Luo
    Jun Zhang
    Josef Pieprzyk
    Lei Pan
    Mehmet A. Orgun
    Quantum Information Processing, 2018, 17
  • [49] A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement
    Lai, Hong
    Luo, Mingxing
    Zhang, Jun
    Pieprzyk, Josef
    Pan, Lei
    Orgun, Mehmet A.
    QUANTUM INFORMATION PROCESSING, 2018, 17 (07)
  • [50] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments (vol 15, e0232277, 2020)
    Chen, Chi-Tung
    Lee, Cheng-Chi
    Lin, Iuon-Chang
    PLOS ONE, 2020, 15 (06):