2020
DOI: 10.1007/978-3-030-40186-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…[SP4] Perfect forward secrecy: It is a very strong form of long-term security which guarantees that future disclosures of some long-term secret keys do not compromise past session keys [ 49 ]. It is widely accepted that the perfect forward secrecy can only be provided by asymmetric schemes.…”
Section: Security and Privacy Resultsmentioning
confidence: 99%
“…[SP4] Perfect forward secrecy: It is a very strong form of long-term security which guarantees that future disclosures of some long-term secret keys do not compromise past session keys [ 49 ]. It is widely accepted that the perfect forward secrecy can only be provided by asymmetric schemes.…”
Section: Security and Privacy Resultsmentioning
confidence: 99%
“…More precisely, we would let π = π ′ fpr(pk A ) fpr(pk B ), where π ′ denotes the original user provided secrets, and we would compute the tags as τ a ← MAC(k a MAC , sid), where the session identifier sid is defined as the transcript of conversation between A and B, with τ b computed similarly. The IETF documents for SPAKE2 4 and J-PAKE 5 provide similar one round KC methods.…”
Section: An Instantiation Based On Spake2mentioning
confidence: 99%
“…Several PAKE constructions provide PFS by default, some of which are listed in Table 1; moreover, PFS can be obtained by adding explicit authentication via a KC step to constructions that do not have this property [8]. Alternatively, to improve efficiency we could resort to symmetric-key schemes that provide PFS, e.g., SAKE [5]. In this case, a PAKE can be used once to bootstrap authentication via a low-entropy secret and to generate the initial symmetric master key required by SAKE.…”
Section: Cryptographic Properties Enabled By Pakementioning
confidence: 99%
See 1 more Smart Citation
“…However, in the schemes where the feature is addressed [6,21], there is no protection against synchronization attacks. Note that recently, in [33], a symmetric key based authentication scheme has been proposed which satisfies at the same time complete perfect forward secrecy and a solution for potential desynchronization problems. However, this scheme does not provide anonymity and consists of five phases with multiple hash functions.…”
Section: Session Specific Temporary Informationmentioning
confidence: 99%