Paradox Stems from the Security Model or the Security Proof?

被引:0
|
作者
Pu, Qiong [1 ]
Ding, Jianmin [1 ]
机构
[1] Informat Engn Univ, Dept Elect, Inst Sci, Zhengzhou, Henan, Peoples R China
关键词
password-authenticated; security proof; key exchange protocol; three-party; security model;
D O I
10.1109/ISCSCT.2008.54
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocol and provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in the presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness of the security model. We defuses it by demonstrating that the attack can be captured in the BPR2000 model. Furthermore, we argue that the paradox is due to the flaws in the proof of security.
引用
收藏
页码:682 / 685
页数:4
相关论文
共 50 条
  • [21] The Security Awareness Paradox: A Case Study
    Tariq, Muhammad Adnan
    Brynielsson, Joel
    Artman, Henrik
    2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 704 - 711
  • [22] The Taliban Takeover in Afghanistan and Security Paradox
    Sakhi, Nilofar
    JOURNAL OF ASIAN SECURITY AND INTERNATIONAL AFFAIRS, 2022, 9 (03) : 383 - 401
  • [23] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [24] IT Security in Lubeck - The design of a modern and future-proof security curriculum
    Stelzner, Marc
    Eisenbarth, Thomas
    2018 12TH EUROPEAN WORKSHOP ON MICROELECTRONICS EDUCATION (EWME), 2018, : 79 - 82
  • [25] The Labyrinth of Jewish Security Arrangements in Johannesburg Thinking through a Paradox about Security
    Steinberg, Jonny
    Marks, Monique
    BRITISH JOURNAL OF CRIMINOLOGY, 2014, 54 (02): : 244 - 259
  • [26] Provable security of digital signatures in the tamper-proof device model
    Varnovskii, N. P.
    DISCRETE MATHEMATICS AND APPLICATIONS, 2008, 18 (04): : 427 - 437
  • [27] A correctness proof of a Mesh Security Architecture
    Kuhlman, Doug
    Moriarty, Ryan
    Braskich, Tony
    Emeott, Steve
    Tripunitara, Mahesh
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 315 - 330
  • [28] A proof system for information flow security
    Bossi, A
    Focardi, R
    Piazza, C
    Rossi, S
    LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2003, 2664 : 199 - 218
  • [29] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888
  • [30] SECURITY AND PROOF OF AN UNOBJECTIONABLE PREOPERATIVE INFORMATION
    MULLER, RT
    KONERMANN, H
    SCHOPPE, G
    ZEITSCHRIFT FUR ORTHOPADIE UND IHRE GRENZGEBIETE, 1989, 127 (05): : 625 - 628