2013
DOI: 10.1007/978-3-642-40203-6_22
|View full text |Cite
|
Sign up to set email alerts
|

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

Abstract: Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Note that this proposition also is not secure to aKCI attacks. In [40] the authors analyzed security model with the adversary registering arbitrary bit strings as keys. They showed generic results for protocols that achieve security even if some keys have been produced maliciously in this way.…”
Section: Previous Workmentioning
confidence: 99%
“…Note that this proposition also is not secure to aKCI attacks. In [40] the authors analyzed security model with the adversary registering arbitrary bit strings as keys. They showed generic results for protocols that achieve security even if some keys have been produced maliciously in this way.…”
Section: Previous Workmentioning
confidence: 99%
“…For key exchange protocols, this approach was pioneered by Bellare, Canetti, and Krawczyk [26] and other transformations have been proposed by Kudla and Paterson [73], Cremers and Feltz [53], and Boyd et al [40]. This kind of result constitutes a natural target for machine-checked proofs, since the cost overhead of building such proof is justified by its multiple applications.…”
Section: Modular Machine-checked Proofsmentioning
confidence: 99%
“…If a protocol Π is secure with respect to an adversary model M, then Π can be transformed into a (more complicated) protocol Π that is secure with respect to a stronger adversary model M . For key exchange, this approach was pioneered by Bellare, Canetti, and Krawczyk [26] and other transformations have been proposed by Kudla and Paterson [73], Cremers and Feltz [53], and Boyd et al [40]. However, existing transformations have several drawbacks, in particular: the transformation in [26] cannot be applied to many protocols of interest; the transformations in [53,40] assume that the initial protocol is already secure in the eCK model; and the transformation in [73] only supports proofs under Gap assumptions, predates the eCK model and is only applicable to weaker security models.…”
Section: Modular Machine-checked Proofs Of One-round Key Exchange Promentioning
confidence: 99%
See 1 more Smart Citation