Modular Security Proofs for Key Agreement Protocols

作者: Caroline Kudla , Kenneth G. Paterson

DOI: 10.1007/11593447_30

关键词: Modular designForward secrecyOracleComputer security modelPublic-key cryptographyRandom oracleComputer securityTheoretical computer scienceComputer scienceMathematical proofKey (cryptography)

摘要: The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular approach the construction proofs for large class protocols. By following proof construction, hope enable simpler and less error-prone analysis generation such technique is compatible with Bellare-Rogaway style models as well more recent Bellare et al. Canetti Krawczyk. particular, show how use decisional oracle can aid these commonly reduces some form Gap assumption.

参考文章(29)
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Simon Blake-Wilson, Don Johnson, Alfred Menezes, Key Agreement Protocols and Their Security Analysis Lecture Notes in Computer Science. pp. 30- 45 ,(1997) , 10.1007/BFB0024447
Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto, Provably secure mobile key exchange: applying the Canetti-Krawczyk approach australasian conference on information security and privacy. pp. 166- 179 ,(2003) , 10.1007/3-540-45067-X_15
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Noel McCullagh, Paulo S. L. M. Barreto, A New Two-Party Identity-Based Authenticated Key Agreement Lecture Notes in Computer Science. pp. 262- 274 ,(2005) , 10.1007/978-3-540-30574-3_18
Michel Abdalla, Olivier Chevassut, David Pointcheval, One-Time Verifier-Based Encrypted Key Exchange Public Key Cryptography - PKC 2005. pp. 47- 64 ,(2005) , 10.1007/978-3-540-30580-4_5
Colin Boyd, Design of Secure Key Establishment Protocols: Successes, Failures and Prospects Progress in Cryptology - INDOCRYPT 2004. pp. 1- 13 ,(2004) , 10.1007/978-3-540-30556-9_1
Sattam S. Al-Riyami, Kenneth G. Paterson, Tripartite Authenticated Key Agreement Protocols from Pairings Lecture Notes in Computer Science. pp. 332- 359 ,(2003) , 10.1007/978-3-540-40974-8_27
Colin Boyd, Wenbo Mao, Kenneth G. Paterson, Key Agreement Using Statically Keyed Authenticators applied cryptography and network security. pp. 248- 262 ,(2004) , 10.1007/978-3-540-24852-1_18
Tatsuaki Okamoto, David Pointcheval, The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes public key cryptography. pp. 104- 118 ,(2001) , 10.1007/3-540-44586-2_8