메뉴 건너뛰기




Volumn 29, Issue 15, 2006, Pages 2788-2797

The importance of proofs of security for key establishment protocols. Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols

Author keywords

Formal specification; Mutual authentication and key establishment protocols; Provable security

Indexed keywords

COMPUTATIONAL COMPLEXITY; ELECTRONIC CRIME COUNTERMEASURES; FAULT TOLERANT COMPUTER SYSTEMS; INFORMATION DISSEMINATION; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33747171940     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2005.10.030     Document Type: Article
Times cited : (32)

References (29)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The Computational Soundness of Formal Encryption)
    • Abadi M., and Rogaway P. Reconciling two views of cryptography (The Computational Soundness of Formal Encryption). Int. Conf. Theor. Comput. Sci. (2000) 3-22
    • (2000) Int. Conf. Theor. Comput. Sci. , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 33747175772 scopus 로고    scopus 로고
    • B. Barak, Y. Lindell, T. Rabin, Protocol Initialization for the Framework of Universal Composability. Cryptology ePrint Archive, Report 2004/006, 2004. Available from: .
  • 3
    • 35048863550 scopus 로고    scopus 로고
    • M. Backes, A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol, in: P. Samarati, D. Goll-mann (Eds.), 9th European Symposium on Research in Computer Security - ESORICS 2004, LNCS, 3193/2004, Springer-Verlag, 2004, pp. 89-108.
  • 4
    • 35248889041 scopus 로고    scopus 로고
    • F. Bao, Security analysis of a password authenticated key exchange protocol, in: C. Boyd, W. Mao (Eds.), 6th Information Security Conference - ISC 2003, LNCS, 2851/2003, Springer-Verlag, 2003, pp. 208-217.
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • M. Bellare, D. Pointcheval, P. Rogaway. Authenticated key exchange secure against dictionary attacks, in: B. Preneel (Ed.), Advances in Cryptology - Eurocrypt 2000, LNCS, 1807/2000, Springer-Verlag, 2000, pp. 139-155.
  • 7
    • 33747159942 scopus 로고    scopus 로고
    • R. Canetti, Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive, Report 2000/067, 2000. Available from: .
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • R. Canetti, H. Krawczyk, Analysis of key-exchange protocols and their use for building secure channels (extended version available from: ), in: B. Pfitzmann (Ed.), Advances in Cryptology - Eurocrypt 2001, LNCS, 2045/2001, Springer-Verlag, 2001, pp. 453-474.
  • 10
    • 33747152008 scopus 로고    scopus 로고
    • K.-K.R. Choo, The Provably-Secure Key Establishment and Mutual Authentication Protocols Lounge, 2005, .
  • 11
    • 84902480071 scopus 로고    scopus 로고
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock, G. Maitland, Complementing computational protocol analysis with formal specifications (Extended version available from: ), in: T. Dimitrakos, F. Martinelli (Eds.), IFIP TC1 WG1.7 2nd International Workshop on Formal Aspects in Security and Trust - FAST 2004, Springer-Verlag, IFIP International Federation for Information Processing Series 173/2005, 2004, pp. 129-144.
  • 12
    • 23944475681 scopus 로고    scopus 로고
    • K.-K. R. Choo, C. Boyd, Y. Hitchcock, G. Maitland. On session identifiers in provably secure protocols: the Bellare-Rogaway three-party key distribution protocol revisited (Extended version available from: ), in: B. Carlo, S. Cimato (Eds.), 4th Conference on Security in Communication Networks - SCN 2004, LNCS, 3352/2005, Springer-Verlag, 2004, pp. 352-367.
  • 13
    • 33646779184 scopus 로고    scopus 로고
    • K.-K.R. Choo, C. Boyd, Y. Hitchcock. Errors in computational complexity proofs for protocols (Available from: ), in: Bimal Roy (Ed.), Advances in Cryptology-Asiacrypt 2005, LNCS, 3788/2005, Springer-Verlag, 2005, pp. 624-643.
  • 14
    • 26444442332 scopus 로고    scopus 로고
    • K.-K.R. Choo, Y. Hitchcock. Security requirements for key establishment proof models: revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols (Extended version available from: ), in: C. Boyd, J.M. Gonzalez-Nieto (Eds.), 10th Australasian Conference on Information Security and Privacy - ACISP 2005, LNCS, 3574/2005, Springer-Verlag, 2005, pp. 429-442.
  • 16
    • 33646812462 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocol for low power devices
    • 5th International Conference on Financial Cryptography - FC 2001. Syverson P.F. (Ed), Springer-Verlag
    • Jakobsson M., and Pointcheval D. Mutual authentication and key exchange protocol for low power devices. In: Syverson P.F. (Ed). 5th International Conference on Financial Cryptography - FC 2001. LNCS 2339/2002 (2001), Springer-Verlag 169-186
    • (2001) LNCS , vol.2339-2002 , pp. 169-186
    • Jakobsson, M.1    Pointcheval, D.2
  • 17
    • 3042646123 scopus 로고    scopus 로고
    • J.-K. Jan, Y.-H. Chen, A new efficient MAKEP for wireless communications, in: 18th International Conference on Advanced Information Networking and Applications - AINA 2004, IEEE Computer Society, pp. 347-350, 2004.
  • 18
    • 26844485818 scopus 로고    scopus 로고
    • An efficient key agreement protocol for secure authentication
    • International Conference On Computational Science And Its Applications - ICCSA 2004. Laganà A., Gavrilova M.L., Kumar V., Mun Y., Tan C.J.K., and Gervasi O. (Eds), Springer-Verlag, New York
    • Kim Y.-S., Huh E.-N., Hwang J., and Lee B.-W. An efficient key agreement protocol for secure authentication. In: Laganà A., Gavrilova M.L., Kumar V., Mun Y., Tan C.J.K., and Gervasi O. (Eds). International Conference On Computational Science And Its Applications - ICCSA 2004. LNCS 3043/2004 (2004), Springer-Verlag, New York 746-754
    • (2004) LNCS , vol.3043-2004 , pp. 746-754
    • Kim, Y.-S.1    Huh, E.-N.2    Hwang, J.3    Lee, B.-W.4
  • 20
  • 21
    • 33747189560 scopus 로고    scopus 로고
    • M. Bellare, P. Rogaway. Entity authentication and key distribution, in: D.R. Stinson, (Ed.), Advances in Cryptology - Crypto 1993, Springer-Verlag, LNCS 773/1993, pp. 110-125, 1993.
  • 22
    • 33747181736 scopus 로고    scopus 로고
    • J. Nam, S. Kim, D. Won, Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme. Cryptology ePrint Archive, Report 2004/251, 2004. Available from: .
  • 24
    • 33747191239 scopus 로고    scopus 로고
    • R. Rieke, Implementing the APA Model for the Symmetric Needham-Schroeder Protocol in State Transition Pattern Notation in the SH Verification Tool, Technical report, Fraunhofer Institute for Secure Telecooperation SIT, 2002.
  • 25
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Advances in Cryptology - Crypto 2001. Kilian J. (Ed), Springer-Verlag, New York
    • Shoup V. OAEP reconsidered. In: Kilian J. (Ed). Advances in Cryptology - Crypto 2001. LNCS 2139/2001 (2001), Springer-Verlag, New York 239-259
    • (2001) LNCS , vol.2139-2001 , pp. 239-259
    • Shoup, V.1
  • 26
    • 35048901616 scopus 로고    scopus 로고
    • Z. Wan, S. Wang. Cryptanalysis of two password-authenticated key exchange protocols, in: H. Wang, J. Pieprzyk, V. Varadharajan (Eds.), 9th Australasian Conference on Information Security and Privacy - ACISP 2004. LNCS, 3108/2004, Springer-Verlag, 2004.
  • 27
    • 84946838086 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Advances in Cryptology - Asiacrypt 2001. Boyd C. (Ed), Springer-Verlag, New York
    • Wong D.S., and Chan A.H. Efficient and mutually authenticated key exchange for low power computing devices. In: Boyd C. (Ed). Advances in Cryptology - Asiacrypt 2001. LNCS 2248/2001 (2001), Springer-Verlag, New York 172-289
    • (2001) LNCS , vol.2248-2001 , pp. 172-289
    • Wong, D.S.1    Chan, A.H.2
  • 28
    • 33747161969 scopus 로고    scopus 로고
    • W.-H. Yang, J.-C. Shen, S.-P. Shieh, Designing Authentication Protocols Against Guessing Attacks. Technical report 2(3), Institute of Information & Computing Machinery, Taiwan, 1999. .
  • 29
    • 1542355248 scopus 로고    scopus 로고
    • Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks
    • Yeh H.-T., and Sun H.-M. Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks. A CM SIGOPS Oper. Syst. Rev. 36 4 (2002) 14-22
    • (2002) A CM SIGOPS Oper. Syst. Rev. , vol.36 , Issue.4 , pp. 14-22
    • Yeh, H.-T.1    Sun, H.-M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.