A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Cryptanalysis of a generic one-round key exchange protocol with strong security
2018
IET Information Security
IET Review Copy Only IET Information Security AW: We would like to thank the reviewer for such good suggestion. We modify the proof in this game accordingly. Briefly speaking, we change Game 2 by asking the challenger to: (i) generate all (ℓ + dℓ) NIKE key pairs (which will be later used as either long-term or ephemeral key) at the beginning of the game, (ii) and abort if: there are two public keys are equivalent. The first change could enable us to check the abort rule (in the second change).
doi:10.1049/iet-ifs.2017.0055
fatcat:auma6xcsingvzeymijxeyowe34