Title | ||
---|---|---|
Towards modelling perfect forward secrecy in two‐message authenticated key exchange under ephemeral‐key revelation |
Abstract | ||
---|---|---|
We examine the recently introduced CF and CF-perfect forward secrecy (PFS) models for two-message authenticated key exchange (TMAKE) by Cremers et al., where the difference between CF and CF-PFS model is that the CF formulates the weak PFS (wPFS), whereas the CF-PFS formulates the PFS. The CF model is claimed by Cremers et al. to be strictly stronger the previous extended Canetti-Krawczyk (eCK) model. However, we notice that the implication relations among CF, CF-PFS, eCK and eCK-PFS model have not been completely studied. Based on TMAKE, we particularly show that CF model and eCK model imply each other under random oracle model. Moreover, we provide a new result on the generic security strengthening transformation (compiler) for building CF-PFS-secure TMAKE protocols. In contrast to a previous work, we show that it is possible to apply the transformation to all CF-secure AKE protocols including all eCK-secure TMAKE protocols in the random oracle model, without restricting to a small specific class of Diffie-Hellman key based protocols. Copyright (C) 2015 John Wiley & Sons, Ltd |
Year | DOI | Venue |
---|---|---|
2015 | 10.1002/sec.1263 | SECURITY AND COMMUNICATION NETWORKS |
Keywords | Field | DocType |
perfect forward secrecy,authenticated key exchange,security model,one-round,protocol compiler,two-message | Computer science,Computer security,Authenticated Key Exchange,Random oracle,Compiler,Forward secrecy,Notice,Ephemeral key,Computer security model | Journal |
Volume | Issue | ISSN |
8 | 18 | 1939-0114 |
Citations | PageRank | References |
3 | 0.39 | 18 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zheng Yang | 1 | 3 | 0.73 |
Yang Wu | 2 | 84 | 18.42 |
Lingyun Zhu | 3 | 39 | 5.48 |
Daigu Zhang | 4 | 3 | 0.39 |