2013
DOI: 10.1007/s10623-013-9852-1
|View full text |Cite
|
Sign up to set email alerts
|

Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal

Abstract: Abstract. We show that it is possible to achieve perfect forward secrecy in two-message or one-round key exchange (KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk (eCK) security model. In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal ephemeral secret keys and the long-term secret keys of the actor of a session (similar to Key Compromise Impersonation). We propose two new game-based security models for K… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
79
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 35 publications
(80 citation statements)
references
References 14 publications
0
79
1
Order By: Relevance
“…For such AKE protocols, advanced security models have been defined (e.g., Rogaway 1993, 1995;Bellare et al 2000;Bresson and Manulis 2008;Canetti and Krawczyk 2001;Cremers and Feltz 2013;Katz and Yung 2003;Krawczyk 2005a;LaMacchia et al 2007]. We take these models as a starting point for our analysis.…”
Section: Background On Security Models For Authenticated Key Exchangementioning
confidence: 99%
See 2 more Smart Citations
“…For such AKE protocols, advanced security models have been defined (e.g., Rogaway 1993, 1995;Bellare et al 2000;Bresson and Manulis 2008;Canetti and Krawczyk 2001;Cremers and Feltz 2013;Katz and Yung 2003;Krawczyk 2005a;LaMacchia et al 2007]. We take these models as a starting point for our analysis.…”
Section: Background On Security Models For Authenticated Key Exchangementioning
confidence: 99%
“…NAXOS is resilient to adversaries that are capable of both RNR and SKR. Cremers and Feltz [2013] show that by applying a signature-based transformation, protocols that are secure in an eCK-like model can be made to additionally satisfy a strong notion of perfect-forward secrecy. The SIG(NAXOS) protocol is the result of applying this transformation to the NAXOS protocol.…”
Section: Bkementioning
confidence: 99%
See 1 more Smart Citation
“…The ephemeral‐key reveal query was introduced in the extended CK (eCK) model instead of the session‐state reveal query in the original model 10 therefore, many security models have been proposed to clarify what kinds of information could be revealed from session state 11–17 . The continual leakage security models emerged prominently due to side‐channel attacks; therefore, many security models are developed to cope with continually revealing long‐term and short‐term secrets in the case of establishing a session key during the cryptographic protocol run 18–24 …”
Section: Introductionmentioning
confidence: 99%
“…Based on adversarial role either as an active or passive attacker in the session under attack, we have the notions of perfect forward secrecy (PFS) and weak-PFS, respectively. The eCK-PFS security model [27] considers the PFS as a security requirement for AKE protocols. Resilience to the KCI attack is also desirable for AKE protocols and has been added as a required security attribute in the HMQV, eCK, and subsequent security models.…”
Section: Introductionmentioning
confidence: 99%