|
A security proof for key exchange protocols
T. Q. Phong, N. Q. Toan, K. X. Thanh Institute of Cryptography Science and Technology, Government Information Security Committee, Viet Nam
Abstract:
We present a technique of modular security proofs for key exchange protocols in the modified Bellare–Rogaway (mBR) model introduced by C. Kudla and K. G. Paterson. We have applied this technique to modify Protocol 1 in their paper to Protocol 2 and analyze its security in this model. These two protocols differ only in the combination of the ephemeral and long-term private keys in the computation of the session key. Our method for proving strong partnering of Protocol may be applied to prove a same result (stated without proof) by C. Kudla and K. G. Paterson.
Key words:
modular method, security proof, strong partnering, mBR model, Bellare–Rogaway model, Canetti–Krawczyk model.
Received 10.VI.2016
Citation:
T. Q. Phong, N. Q. Toan, K. X. Thanh, “A security proof for key exchange protocols”, Mat. Vopr. Kriptogr., 7:4 (2016), 117–132
Linking options:
https://www.mathnet.ru/eng/mvk207https://doi.org/10.4213/mvk207 https://www.mathnet.ru/eng/mvk/v7/i4/p117
|
Statistics & downloads: |
Abstract page: | 278 | Full-text PDF : | 226 | References: | 49 | First page: | 4 |
|