2009
DOI: 10.1007/978-3-642-04846-3_12
|View full text |Cite
|
Sign up to set email alerts
|

Strongly Secure Authenticated Key Exchange without NAXOS’ Approach

Abstract: Abstract. LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X = g H(x,a) . As a result, no one is able to query the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…6, 12] (shown eCK-secure) fail in authentication when leakages one the intermediate results are considered. Indeed an attacker, which learns the ephemeral secret exponents s 1 = x + a 1 and s 2 = x + a 2 in a session at (see the steps 2 and 3 of the protocols 1 and 2 [12]), can indefinitely impersonate to any party. Notice that the attacker cannot computeÂ's static key from s 1 and s 2 , while it is not difficult to see that leakages on s 1 (or s 2 ) and the ephemeral key, in the same session implyÂ's static key disclosure.…”
Section: Proposition 1 Any Seck-secure Protocol Is Also An Eck-securmentioning
confidence: 99%
“…6, 12] (shown eCK-secure) fail in authentication when leakages one the intermediate results are considered. Indeed an attacker, which learns the ephemeral secret exponents s 1 = x + a 1 and s 2 = x + a 2 in a session at (see the steps 2 and 3 of the protocols 1 and 2 [12]), can indefinitely impersonate to any party. Notice that the attacker cannot computeÂ's static key from s 1 and s 2 , while it is not difficult to see that leakages on s 1 (or s 2 ) and the ephemeral key, in the same session implyÂ's static key disclosure.…”
Section: Proposition 1 Any Seck-secure Protocol Is Also An Eck-securmentioning
confidence: 99%
“…While there have already been some two-pass AKE protocols [9,15,6,11,7] provably secure in the eCK model, none of them achieve perfect forward security against active adversary. Although it is possible to transform a two-pass AKE protocol provably secure in eCK model into a three-pass AKE protocol with perfect forward security against active adversary by adding two messages [2,8], the resulting protocol have a higher round-complexity.…”
Section: Our Contributionsmentioning
confidence: 99%
“…On the other hand, constructing the authenticated key exchange protocol secure in eCK model without NAXOS transformation has its advantages. For example, it can reduce the risk of leakage of the static private key and use of the random oracle [7].…”
Section: Introductionmentioning
confidence: 99%
“…Many general AKE schemes have been proposed so far; see, for example, MQV [3], HMQV [4], SIGMA [5], KEA+ [6], NAXOS [7], CMQV [8], SMQV [9], E-NAXOS [10], Huang [11], or Kim et al [12] with numerous additional modifications. Their security has been analyzed in many models, for example, CK [13], eCK [7], and seCK [9], under various attack scenarios.…”
Section: Introductionmentioning
confidence: 99%