2006
DOI: 10.1007/11745853_26
|View full text |Cite
|
Sign up to set email alerts
|

SAS-Based Authenticated Key Agreement

Abstract: Key agreement protocols are frequently based on the Diffie-Hellman protocol but require authenticating the protocol messages in two ways. This can be made by a cross-authentication protocol. Such protocols, based on the assumption that a channel which can authenticate short strings is available (SAS-based), have been proposed by Vaudenay. In this paper, we survey existing protocols and we propose a new one. Our proposed protocol requires three moves and a single SAS to be authenticated in two ways. It is prova… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(72 citation statements)
references
References 17 publications
0
72
0
Order By: Relevance
“…This is the idea we have briefly seen in Wong-Stajano, and it appears in many other schemes proposed in the literature [2,6,22,23,38,53,56,57]. We will analyse these here.…”
Section: Indirect Bindingmentioning
confidence: 97%
See 3 more Smart Citations
“…This is the idea we have briefly seen in Wong-Stajano, and it appears in many other schemes proposed in the literature [2,6,22,23,38,53,56,57]. We will analyse these here.…”
Section: Indirect Bindingmentioning
confidence: 97%
“…For this reason, there have been a number of algorithms proposed to compute short digest [2,14,15,22,23,33,38]. To the best of our knowledge, the only ones that explicitly exploit the short output to improve efficiency as well as being proved to satisfy the above specification are based on the idealised framework invented by the authors [32,33], which are adaptations of several well-studied universal hash constructions of Mansour et al [26], and Krawczyk [20,21].…”
Section: Short Hash and Digest Functionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Noninteractive protocols have been proposed in Balfanz et al [1]; Pasini and Vaudenay [19]; Mashatan and Stinson [14]; and Reyhanitabar et al [21]. Interactive protocols have been discussed in many papers, including the following: the so-called MANA protocols were introduced in Gehrmann et al [5] and Gehrmann and Nyberg [6]; Hoepman [8]; the SAS protocol proposed by Vaudenay [27]; Pasini and Vaudenay [20]; Laur and Nyberg [11]; Laur and Pasini [12,13]; and Mashatan and Stinson [15]. Group protocols are studied in Nguyen and Roscoe [18].…”
Section: Interactive Versus Noninteractive Protocolsmentioning
confidence: 99%