首页> 外文会议>International Conference on Cryptology in Malaysia; 20050928-30; Kuala Lumpur(MY) >On Session Key Construction in Provably-Secure Key Establishment Protocols
【24h】

On Session Key Construction in Provably-Secure Key Establishment Protocols

机译:可证明安全的密钥建立协议中的会话密钥构建

获取原文
获取原文并翻译 | 示例

摘要

We examine the role of session key construction in provably-secure key establishment protocols. We revisit an ID-based key establishment protocol due to Chen & Kudla (2003) and an ID-based protocol 2P-IDAKA due to McCullagh & Barreto (2005). Both protocols carry proofs of security in a weaker variant of the Bellare & Rogaway (1993) model where the adversary is not allowed to make any Reveal query. We advocate the importance of such a (Reveal) query as it captures the known-key security requirement. We then demonstrate that a small change to the way that session keys are constructed in both protocols results in these protocols being secure without restricting the adversary from asking the Reveal queries in most situations. We point out some errors in the existing proof for protocol 2P-IDAKA, and provide proof sketches for the improved Chen & Kudla's protocol. We conclude with a brief discussion on ways to construct session keys in key establishment protocols.
机译:我们研究了会话密钥构造在可证明安全的密钥建立协议中的作用。我们回顾了Chen和Kudla(2003)提出的基于ID的密钥建立协议,以及McCullagh&Barreto(2005)提出的基于ID的协议2P-IDAKA。在Bellare&Rogaway(1993)模型的一个较弱的变体中,这两个协议都带有安全性证明,其中不允许对手进行任何Reveal查询。我们提倡这种(显示)查询的重要性,因为它捕获了已知密钥的安全要求。然后,我们证明,对两种协议中的会话密钥的构造方式进行微小的更改都会使这些协议变得安全,而在大多数情况下不会限制对手询问Reveal查询。我们指出了协议2P-IDAKA的现有证明中的一些错误,并提供了改进的Chen&Kudla协议的证明草图。我们以在密钥建立协议中构造会话密钥的方式的简短讨论作为结束。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号