Filters








23 Hits in 6.2 sec

Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model

Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
2005 Applicable Algebra in Engineering, Communication and Computing  
Various optimizations in the Canetti-Krawczyk model for secure protocol design are proven to preserve security.  ...  In order to obtain the required proofs, we find it necessary to slightly revise the authenticated links part of the Canetti-Krawczyk model.  ...  Conclusion The Canetti-Krawczyk proof model is very attractive due to its modular nature.  ... 
doi:10.1007/s00200-005-0185-9 fatcat:344pxmky3nfulbyr7k5u2ezgfa

Provably secure authenticated group Diffie-Hellman key exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2007 ACM Transactions on Privacy and Security  
Starting from the famous 2-party Diffie-Hellman (DH) key exchange protocol, and from its authenticated variants, security experts have extended it to the multi-party setting for over a decade and completed  ...  a formal analysis in the framework of modern cryptography in the past few years.  ...  Acknowledgments The second author was supported by the Director, Office of Science, Office of Advanced Scientific Computing Research, Mathematical Information and Computing Sciences Division, of the U.S  ... 
doi:10.1145/1266977.1266979 fatcat:e5mmzzjbrvhmbao7r2laylgjcq

Privacy, Discovery, and Authentication for the Internet of Things [article]

David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh
2017 arXiv   pre-print
Our protocols provide private and authentic service advertisements, zero round-trip (0-RTT) mutual authentication, and are provably secure in the Canetti-Krawczyk key-exchange model.  ...  In contrast to alternatives, our protocols are lightweight and require minimal modification to existing key-exchange protocols.  ...  We thank Bruno Blanchet for his help in verifying the unlinkability property of our modified private mutual authentication protocol in Section 4.  ... 
arXiv:1604.06959v3 fatcat:45marxb3xzekflyu35yx2b3uay

HMQV: A High-Performance Secure Diffie-Hellman Protocol [chapter]

Hugo Krawczyk
2005 Lecture Notes in Computer Science  
In order to provide an answer to this question we analyze the MQV protocol in the Canetti-Krawczyk model of key exchange.  ...  One question that has not been settled so far is whether the protocol can be proven secure in a rigorous model of key-exchange security.  ...  key exchange model of Canetti and Krawczyk [11] ).  ... 
doi:10.1007/11535218_33 fatcat:osduwo73wnbqvdmpgfb6ly6rqm

SAM: Secure Access of Media Independent Information Service with User Anonymity

Guangsong Li, Jianfeng Ma, Qi Jiang
2010 EURASIP Journal on Wireless Communications and Networking  
To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH) services.  ...  The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers.  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their constructive comments that have helped them to improve this paper.  ... 
doi:10.1155/2010/249169 fatcat:lv3xmf6ufzhc7go74y2c2fww6i

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  for editorial corrections and comments.  ...  Acknowledgments We wish to thank Ian Blake, Sanjit Chatterjee, Sam Jaques, Paul van Oorschot, Francisco Rodríguez Henríquez, and Palash Sarkar for helpful comments on an earlier draft; and Ann Hibner Koblitz  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na

TOPAS

Sven Schäge
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
We present TOPAS (Transmission Optimal Protocol with Active Security), the first key agreement protocol with optimal communication complexity that provides security against fully active adversaries.  ...  We also present a variant of our protocol, TOPAS+, which, under the Strong Diffie-Hellman assumption, provides better computational efficiency in the key derivation phase.  ...  I would also like to thank the anonymous reviewers for their helpful comments. This work was supported by the DFG-Research Training Group UbiCrypt (GRK 1817/1).  ... 
doi:10.1145/2810103.2813683 dblp:conf/ccs/Schage15 fatcat:yejzvranjzcobdk3ldd3ty2gfy

Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks

Guangsong Li, Qi Jiang, Yanan Shi, Fushan Wei
2016 International Journal of Network Security  
Media independent information service is one of the important parts of the IEEE 802.21 standard to optimize vertical handover in wireless heterogeneous networks.  ...  In this paper, an anonymous network information acquirement protocol is proposed for a mobile user, which can be used to establish a secure channel between the mobile user and the information server.  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their comments that will help them to improve this paper.  ... 
dblp:journals/ijnsec/LiJSW16 fatcat:7dkoigqiinb6nnlnlp57zhbkyu

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead [chapter]

Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2010 Lecture Notes in Computer Science  
Yet, after introducing some simple but crucial hashing operations, we obtain a protocol, mOT, for which we present a rigorous proof of security in the Canetti-Krawczyk (CK) Key-Agreement Protocol model  ...  For the proof of full PFS against active attackers (and only for this proof) we resort to non-black-box assumptions in the form of the "knowledge of exponent" assumptions.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory  ... 
doi:10.1007/978-3-642-13708-2_19 fatcat:lw4x7vreqjbkhjtwsa76o3k5by

A Modular Security Analysis of the TLS Handshake Protocol [chapter]

P. Morrissey, N. P. Smart, B. Warinschi
2008 Lecture Notes in Computer Science  
The main contribution of the paper is a modular and generic proof of security for the application keys established through the TLS protocol.  ...  The security of the overall protocol then follows from proofs of security for the basic pre-master key generation protocols employed by TLS.  ...  Finally, an important security model that is related to ours is that of Canetti and Krawczyk (CK) [13] .  ... 
doi:10.1007/978-3-540-89255-7_5 fatcat:zgrujlwuardrdf3aym6o3vjvhm

Generic Forward-Secure Key Agreement Without Signatures [chapter]

Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
2017 Lecture Notes in Computer Science  
We prove the security of our transformation in the random oracle model.  ...  An additional feature of our proposal is that it helps avoid the bad practice of using long term keys certified for encryption to produce digital signatures.  ...  The first generic compilers for authenticated key exchange were by Bellare, Canetti, and Krawczyk [3] later refined by Canetti and Krawczyk [9] .  ... 
doi:10.1007/978-3-319-69659-1_7 fatcat:kj47okfjvnhexct7uwdbaeo7by

AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT

Björn Haase, Benoît Labrique
2019 Transactions on Cryptographic Hardware and Embedded Systems  
Specifically the use of a verifier-based password-authenticated key-exchange (V-PAKE) protocol as a hedge against public-key-infrastructure (PKI) failures is considered important.  ...  The differences between IIoT and the conventional Internet use-cases result in largely modified threats and require special procedures for allowing both, convenient and secure use in the highly constrained  ...  Acknowledgements The authors would like to thank the anonymous referees for their helpful comments and advice and their great care with the manuscript.  ... 
doi:10.13154/tches.v2019.i2.1-48 dblp:journals/tches/HaaseL19 fatcat:n7i2bbjhnbdb5dk7ixw3dbftcq

Future-Proofing Key Exchange Protocols

Jacqueline Brendel
2019
Their model constitutes the basis of the many subsequent treatments of authenticated key exchange security, including the models presented in this thesis.  ...  key exchange protocol is only known to the participants in the protocol and can be used securely in cryptographic protocols, i.e., is sufficiently random.  ...  The results in this thesis focus on the case of mutually authenticated key exchange protocols between two parties with pre-specified peers as introduced by Canetti and Krawczyk [CK02] , i.e., the identity  ... 
doi:10.25534/tuprints-00009642 fatcat:2edjtbzotbanjblfy4kv5e7rui

Interactive Encryption and Message Authentication [chapter]

Yevgeniy Dodis, Dario Fiore
2014 Lecture Notes in Computer Science  
In this work, we initiate rigorous study of (possibly) interactive PKE and PKMA schemes.  ...  PKE) schemes, where the verifier (resp. encryptor) is assured that the "current" message can only be authenticated (resp. decrypted) by the secret key owner now, as opposed to some time in the past (resp  ...  It is worth mentioning that the notion of replay-secure PKE is similar to the notion of Replayable CCA-secure encryption (RCCA) introduced by Canetti, Krawczyk and Nielsen [10] .  ... 
doi:10.1007/978-3-319-10879-7_28 fatcat:c77p7phskrht3kiamsbh7h2y54

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
In a nutshell, this is the PKI problem, and the papers presented herein propose new solutions and insight for these questions.  ...  This volume holds 16 refereed papers including the presentation paper by the invited speaker P. Landrock. In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  and the IWT-SBO project (ADAPID) "Advanced Applications for Electronic Identity Cards in Flanders".  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64
« Previous Showing results 1 — 15 out of 23 results