Security in Key Agreement: Two-Party Certificateless Schemes

作者: Colleen Marie Swanson

DOI:

关键词:

摘要: The main goal of cryptography is to enable secure communication over a public channel; often secret shared among the communicating parties used achieve this. process by which these agree on such called key agreement. In this thesis, we focus two-party agreement protocols in public-key setting and study various methods establish validate keys. We pay particular attention certificateless schemes attempt formalize relevant notion security. To that end, give possible extension existing extended Canetti-Krawzcyk security model applicable setting. observe none have seen literature are model; it an open question whether exist. analyze several published protocols, demonstrating existence compromise impersonation attacks even man-in-the-middle attack one case, contrary claims authors. also briefly describe weaknesses exhibited context our suggested model.

参考文章(45)
Konstantinos Chalkias, George Stephanides, Dimitris Hristu-Varsakelis, F. Mpaldimtsi, ON THE KEY-COMPROMISE IMPERSONATION VULNERABILITY OF ONE-PASS KEY ESTABLISHMENT PROTOCOLS international conference on security and cryptography. pp. 222- 228 ,(2007)
Bo Gyeong Kang, Je Hong Park, Is it possible to have CBE from CL-PKE? IACR Cryptology ePrint Archive. ,vol. 2005, pp. 431- ,(2005)
Joseph H. Silverman, The Arithmetic of Elliptic Curves ,(1986)
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Shahrokh Saeednia, Identity-based and self-certified key-exchange protocols Information Security and Privacy. ,vol. 1270, pp. 303- 313 ,(1997) , 10.1007/BFB0027937
Dan Boneh, Antoine Joux, Phong Q. Nguyen, Why Textbook ElGamal and RSA Encryption Are Insecure international conference on the theory and application of cryptology and information security. pp. 30- 43 ,(2000) , 10.1007/3-540-44448-3_3
Simon Blake-Wilson, Don Johnson, Alfred Menezes, Key Agreement Protocols and Their Security Analysis Lecture Notes in Computer Science. pp. 30- 45 ,(1997) , 10.1007/BFB0024447
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Tarjei K. Mandt, Chik How Tan, Certificateless authenticated two-party key agreement protocols ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues. pp. 37- 44 ,(2006) , 10.1007/978-3-540-77505-8_4
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5