首页> 外文期刊>ACM Transaction on Information and System Security >Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
【24h】

Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

机译:对组密钥交换协议上的密钥泄露模拟攻击进行建模

获取原文
获取原文并翻译 | 示例

摘要

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
机译:两方密钥交换(2PKE)协议已在考虑不同对抗行为的各种模型下进行了严格分析。但是,组密钥交换(GKE)协议的分析尚未像2PKE协议那样广泛。特别是,对于GKE协议,一种被称为密钥泄露模拟(KCI)弹性的重要安全属性已被完全忽略。非正式地,如果协议参与者A的长期秘密密钥的折衷不允许对手将诚实的参与者B冒充给A,则该协议可以说提供KCI弹性。在本文中,我们认为KCI可以为GKE提供弹性协议至少与2PKE协议一样重要。我们的第一个贡献是考虑到外部和内部对手的KCI攻击,对GKE协议的安全性进行了修订。我们还根据修订的安全性定义(假设随机预言)为现有的两轮GKE协议提供了新的安全性证明。然后,我们展示如何使用文献中的已知编译器以通用方式实现内部人员KCIR。正如人们可能期望的那样,这种额外的安全保证是以另一轮通信为代价的。最后,我们证明了一些现有协议对于外部KCI攻击是不安全的。对这些协议的攻击说明了考虑GKE协议的KCI弹性的必要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号