Key agreement protocols and their security analysis (Extended abstract)

被引:0
|
作者
Blake-Wilson, S [1 ]
Johnson, D
Menezes, A
机构
[1] Univ London, Royal Holloway & Bedford New Coll, Dept Math, Egham TW20 0EX, Surrey, England
[2] Certicom Corp, Mississauga, ON L5R 3L7, Canada
[3] Auburn Univ, Dept Discrete & Stat Sci, Auburn, AL 36849 USA
来源
关键词
D O I
10.1007/bfb0024447
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key confirmation, in the asymmetric (public-key) setting. A formal model of distributed computing is provided, and a definition of the goals within this model supplied. The protocols proposed are then proven correct within this framework in the random oracle model. We emphasize the relevance of these theoretical results to the security of systems used in practice. Practical implementation of the protocols is discussed. Such implementations are currently under consideration for standardization [2, 3, 18].
引用
收藏
页码:30 / 45
页数:16
相关论文
共 50 条
  • [1] On security models and compilers for group key exchange protocols (Extended abstract)
    Bresson, Emmanuel
    Manulis, Mark
    Schwenk, Joerg
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 292 - +
  • [2] Security analysis and applications of standard key agreement protocols
    Oh, S
    Kwak, J
    Lee, S
    Won, D
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 191 - 200
  • [3] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
  • [4] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [5] Analysis of security requirements for cryptographic voting protocols (extended abstract)
    Cetinkaya, Orhan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
  • [6] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [7] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [8] Modular security proofs for key agreement protocols
    Kudla, C
    Paterson, KG
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 549 - 565
  • [9] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [10] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
    Barbosa, Manuel
    Farshim, Pooya
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253