首页> 外文会议>Provable security >Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage
【24h】

Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage

机译:经过身份验证的密钥交换可抵抗中间计算泄漏的分类安全性考虑

获取原文
获取原文并翻译 | 示例

摘要

SMQV authenticated key exchange scheme was stated to be secure against leakage of intermediate computations, i.e., secure in the seCK model. However, in this paper, we show errors in the security proof of SMQV. The found errors proceed from a failure in a simulation of leakage of intermediate computations. Moreover, we identify flaws in the security proofs of the underlying building tools of both SMQV and FHMQV, showing that both SMQV and FH-MQV are not proven secure even in the traditional CK model. Then, we consider the cause of difficulty to prove security in the seCK model and classify previous Dime-Hellman type authenticated key exchange schemes in the sense of achievable security levels. As a result, unfortunately, known schemes fall into hard to prove or insecure. Accordingly, we suggest that Diffie-Hellman type schemes provably secure in the seCK model are hard (or highly subtle) to achieve. Therefore, this paper clarifies the technical limitations (or high subtleties) of Diffie-Hellman type schemes for achieving provable security in the seCK model against leakage of intermediate computations.
机译:据说SMQV认证密钥交换方案是安全的,可以防止中间计算的泄漏,即在seCK模型中是安全的。但是,在本文中,我们在SMQV的安全性证明中显示了错误。发现的错误源于中间计算泄漏模拟的失败。此外,我们发现了SMQV和FHMQV的基础构建工具的安全性证明中的缺陷,这表明即使在传统的CK模型中,SMQV和FH-MQV都没有被证明是安全的。然后,我们考虑难以在seCK模型中证明安全性的原因,并从可实现的安全级别的意义上对以前的Dime-Hellman类型认证密钥交换方案进行分类。结果,不幸的是,已知方案陷入难以证明或不安全的境地。因此,我们建议在seCK模型中可证明是安全的Diffie-Hellman类型方案很难(或非常微妙)实现。因此,本文阐明了Diffie-Hellman类型方案的技术局限性(或较高的精妙性),用于在seCK模型中实现可证明的安全性以防止中间计算的泄漏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号