메뉴 건너뛰기




Volumn , Issue , 2007, Pages 222-228

On the key-compromise impersonation vulnerability of one-pass key establishment protocols

Author keywords

Key compromise impersonation; One pass protocols; One way channel; Two party key establishment

Indexed keywords

DIGITAL SIGNATURE; IMPERSONATION ATTACK; INSECURE NETWORKS; KEY ESTABLISHMENT PROTOCOL; KEY-COMPROMISE IMPERSONATION; ONE-PASS; ONE-PASS PROTOCOLS; ONE-WAY CHANNEL; PRIVATE KEY; SECURITY MECHANISM; SESSION KEY; TWO-PARTY KEY ESTABLISHMENT;

EID: 67649818515     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 2
    • 67649679929 scopus 로고    scopus 로고
    • ANSI-X9.42 (1998). Agreement of symmetric algorithm keys using Diffle-Hellman. In Working Draft.
    • ANSI-X9.42 (1998). Agreement of symmetric algorithm keys using Diffle-Hellman. In Working Draft.
  • 3
    • 67649736864 scopus 로고    scopus 로고
    • ANSI-X9.63 (1998). Elliptic curve key agreement and key transport protocols. In Working Draft.
    • ANSI-X9.63 (1998). Elliptic curve key agreement and key transport protocols. In Working Draft.
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer-Verlag
    • Bellare, M., Pointcheval, D., and Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In Proceedings EUROCRYPT 2000, LNCS 1807, pp. 139-155. Springer-Verlag.
    • (2000) Proceedings EUROCRYPT 2000, LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 10
    • 36248981438 scopus 로고
    • Cryptographic method and apparatus for public key exchange with authentication. In
    • U.S. Patent 4956865
    • Goss, K.-C. (1990). Cryptographic method and apparatus for public key exchange with authentication. In U.S. Patent 4956865.
    • (1990)
    • Goss, K.-C.1
  • 11
    • 67649711474 scopus 로고    scopus 로고
    • IEEE-1363 (1998). Standard specifications for public key cryptography. In Working Draft.
    • IEEE-1363 (1998). Standard specifications for public key cryptography. In Working Draft.
  • 12
    • 35048878818 scopus 로고    scopus 로고
    • One-round protocols for two-party authenticated key exchange
    • 3089/ ofLNCS. Springer-Verlag
    • Jeong, I., Katz, J., and Lee, D. (2004). One-round protocols for two-party authenticated key exchange. In Applied Cryptography and Network Security - ACNS 2004, pp. 220-232., Vol. 3089/2004 ofLNCS. Springer-Verlag.
    • (2004) Applied Cryptography and Network Security , vol.ACNS 2004 , pp. 220-232
    • Jeong, I.1    Katz, J.2    Lee, D.3
  • 13
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key share attack on the mqv key agreement protocol
    • Springer-Verlag
    • Kaliski, B. (2001). An unknown key share attack on the mqv key agreement protocol. In ACM Transactions on Information and System Security, pp. 3649. Springer-Verlag.
    • (2001) ACM Transactions on Information and System Security , pp. 3649
    • Kaliski, B.1
  • 14
    • 35248831117 scopus 로고    scopus 로고
    • Forward secrecy in password-only key exchange protocols
    • Springer-Verlag
    • Katz, J., Ostrovsky, R., and Yung, M. (2002). Forward secrecy in password-only key exchange protocols. In Proceedings SCN 2002, LNCS 2576, pp. 29-44. Springer-Verlag.
    • (2002) Proceedings SCN 2002, LNCS , vol.2576 , pp. 29-44
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 15
    • 33745179557 scopus 로고    scopus 로고
    • Hmqv: A high-performance secure diffle- hellman protocol
    • Springer-Verlag
    • Krawczyk, H. (2005). Hmqv: A high-performance secure diffle- hellman protocol. In Proceedings of Advances in Cryptology - Crypto 'OS, LNCS 3621, pp. 546-566. Springer-Verlag.
    • (2005) Proceedings of Advances in Cryptology - Crypto 'OS, LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 19
    • 0005243827 scopus 로고    scopus 로고
    • An efficient protocol for authenticated key agreement
    • 98-05, University of Waterloo
    • Law, L., Menezes, A., Qu, M., Solinas, J., and Vanstone, S. (1998). An efficient protocol for authenticated key agreement. In Technical report CORR 98-05, University of Waterloo.
    • (1998) Technical report CORR
    • Law, L.1    Menezes, A.2    Qu, M.3    Solinas, J.4    Vanstone, S.5
  • 24
    • 33745292713 scopus 로고    scopus 로고
    • Oh, S., Kwak, J., and Lee, S.and Won, D. (2003). Security analysis and applications of standard key agreement protocols. In ICCSA (2), pp. 191-200. Springer-Verlag.
    • Oh, S., Kwak, J., and Lee, S.and Won, D. (2003). Security analysis and applications of standard key agreement protocols. In ICCSA (2), pp. 191-200. Springer-Verlag.
  • 25
    • 33746215179 scopus 로고    scopus 로고
    • On the resilience of key agreement protocols to key compromise impersonation
    • Springer-Verlag
    • Strangio, M.-A. (2006). On the resilience of key agreement protocols to key compromise impersonation. In European PKI Workshop on Public Key Infrastructure , IMCS 4043, pp. 233-247. Springer-Verlag.
    • (2006) European PKI Workshop on Public Key Infrastructure , IMCS , vol.4043 , pp. 233-247
    • Strangio, M.-A.1
  • 26
    • 67649704527 scopus 로고    scopus 로고
    • Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange. Cryptology ePrint Archive
    • Report 2005/455
    • Zhu, R. W., Tian, X., and Wong, D. S. (2005). Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange. Cryptology ePrint Archive, Report 2005/455. http://eprint.iacr.org/.
    • (2005)
    • Zhu, R.W.1    Tian, X.2    Wong, D.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.