2009
DOI: 10.1007/978-3-642-04474-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of the PACE Key-Agreement Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 57 publications
(42 citation statements)
references
References 8 publications
0
41
0
1
Order By: Relevance
“…The Diffie-Hellman key is subsequently used to secure the communication. In [BFK09] it has been shown that the PACE protocol achieves the widely accepted security notion of password-based authenticated key agreement of Bellare-Pointcheval-Rogaway [BPR00], in its strong form of Abdalla et al [AFP05]. This holds under a variant of the Diffie-Hellman assumption, assuming secure cryptographic building blocks, and idealizing the underlying block cipher and the hash function.…”
Section: Introductionmentioning
confidence: 89%
See 3 more Smart Citations
“…The Diffie-Hellman key is subsequently used to secure the communication. In [BFK09] it has been shown that the PACE protocol achieves the widely accepted security notion of password-based authenticated key agreement of Bellare-Pointcheval-Rogaway [BPR00], in its strong form of Abdalla et al [AFP05]. This holds under a variant of the Diffie-Hellman assumption, assuming secure cryptographic building blocks, and idealizing the underlying block cipher and the hash function.…”
Section: Introductionmentioning
confidence: 89%
“…Basically, this assumption says that H acts like a random function to which all parties have access. We do not make any explicit assumption about the cipher C here, but note that the security proof for PACE in [BFK09] (to which we reduce AKE security to) relies on an ideal cipher.…”
Section: Security Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…A combination of EKE and SPEKE is used in PACE as described in [BFK09], which is, e.g., used in international travel documents. In this method, a nonce is encrypted rather than a key.…”
Section: Transmission Of Public Keysmentioning
confidence: 99%