A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
[chapter]
2013
Lecture Notes in Computer Science
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a
doi:10.1007/978-3-642-40203-6_22
fatcat:a4dcmjwt7beczmkd7v3og7qg7u