首页> 外文会议>IEEE Computer Security Foundations Symposium >Authentication in Key-Exchange: Definitions, Relations and Composition
【24h】

Authentication in Key-Exchange: Definitions, Relations and Composition

机译:密钥交换中的身份验证:定义,关系和组成

获取原文

摘要

We present a systematic approach to define and study authentication notions in authenticated key-exchange protocols. We propose and use a flexible and expressive predicate-based definitional framework. Our definitions capture key and entity authentication, in both implicit and explicit variants, as well as key and entity confirmation, for authenticated key-exchange protocols. In particular, we capture critical notions in the authentication space such as key-compromise impersonation resistance and security against unknown key-share attacks. We first discuss these definitions within the Bellare-Rogaway model and then extend them to Canetti-Krawczyk-style models. We then show two useful applications of our framework. First, we look at the authentication guarantees of three representative protocols to draw several useful lessons for protocol design. The core technical contribution of this paper is then to formally establish that composition of secure implicitly authenticated key-exchange with subsequent confirmation protocols yields explicit authentication guarantees. Without a formal separation of implicit and explicit authentication from secrecy, a proof of this folklore result could not have been established.
机译:我们提出了一种系统的方法来定义和研究经过身份验证的密钥交换协议中的身份验证概念。我们提出并使用了一个灵活的,基于谓词的谓词定义框架。对于已认证的密钥交换协议,我们的定义以隐式和显式形式捕获密钥和实体认证,以及密钥和实体确认。尤其是,我们捕获了身份验证空间中的关键概念,例如密钥泄露的模拟抵抗性和针对未知密钥共享攻击的安全性。我们首先在Bellare-Rogaway模型中讨论这些定义,然后将它们扩展到Canetti-Krawczyk风格的模型。然后,我们展示了该框架的两个有用的应用程序。首先,我们查看三种代表性协议的身份验证保证,以为协议设计汲取一些有用的经验教训。然后,本文的核心技术贡献是正式确定安全隐式认证密钥交换与后续确认协议的组合产生显式认证保证。没有将隐式和显式身份验证与保密进行正式分离,就无法确定这种民俗结果的证据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号