메뉴 건너뛰기




Volumn 5984 LNCS, Issue , 2010, Pages 16-33

Modeling leakage of ephemeral secrets in tripartite/group key exchange

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION ROUNDS; CURRENT MODELS; DESIGN AND ANALYSIS; GROUP KEY EXCHANGE; KEY CONFIRMATION; KEY EXCHANGE; PROVABLY SECURE;

EID: 77954580101     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14423-3_2     Document Type: Conference Paper
Times cited : (24)

References (35)
  • 1
    • 35048823512 scopus 로고    scopus 로고
    • Tripartite Authenticated Key Agreement Protocols from Pairings
    • Paterson, K.G. (ed.) Cryptography and Coding 2003. Springer, Heidelberg
    • Al-Riyami, S.S., Paterson, K.G.: Tripartite Authenticated Key Agreement Protocols from Pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 332-359. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2898 , pp. 332-359
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 2
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and their Security Analysis
    • Darnell, M.J. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 4
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321-336. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 6
    • 38049011067 scopus 로고    scopus 로고
    • Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
    • Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. Springer, Heidelberg
    • Bresson, E., Manulis, M.: Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 395-409. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4610 , pp. 395-409
    • Bresson, E.1    Manulis, M.2
  • 7
    • 50849102269 scopus 로고    scopus 로고
    • Contributory Group Key Exchange in the Presence of Malicious Participants
    • Bresson, E., Manulis, M.: Contributory Group Key Exchange in the Presence of Malicious Participants. IET Information Security 2(3), 85-93 (2008)
    • (2008) IET Information Security , vol.2 , Issue.3 , pp. 85-93
    • Bresson, E.1    Manulis, M.2
  • 10
    • 38149080530 scopus 로고    scopus 로고
    • On Security Models and Compilers for Group Key Exchange Protocols
    • Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. Springer, Heidelberg
    • Bresson, E., Manulis, M., Schwenk, J.: On Security Models and Compilers for Group Key Exchange Protocols. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 292-307. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4752 , pp. 292-307
    • Bresson, E.1    Manulis, M.2    Schwenk, J.3
  • 11
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 68849108882 scopus 로고    scopus 로고
    • Session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS key exchange protocol
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
    • Cremers, C.: Session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS key exchange protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20-33. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 20-33
    • Cremers, C.1
  • 15
    • 67049155509 scopus 로고    scopus 로고
    • Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    • Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography - PKC 2009. Springer, Heidelberg
    • Gorantla, M.C., Boyd, C., González-Nieto, J.M.: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography - PKC 2009. LNCS, vol. 5443, pp. 105-123. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 105-123
    • Gorantla, M.C.1    Boyd, C.2    González-Nieto, J.M.3
  • 17
    • 34548783058 scopus 로고    scopus 로고
    • Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
    • Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. Springer, Heidelberg
    • Hitchcock, Y., Boyd, C., Nieto, J.M.G.: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 17-32. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3348 , pp. 17-32
    • Hitchcock, Y.1    Boyd, C.2    Nieto, J.M.G.3
  • 18
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
    • Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385-393. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1838 , pp. 385-393
    • Joux, A.1
  • 19
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4), 263-276 (2004)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 20
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key-share attack on the mqv key agreement protocol
    • doi:10.1145/501978.501981
    • Kaliski Jr., B.S.: An unknown key-share attack on the mqv key agreement protocol. ACM Transaction on Information and System Security 4(3), 275-288 (2001) doi:10.1145/501978.501981
    • (2001) ACM Transaction on Information and System Security , vol.4 , Issue.3 , pp. 275-288
    • Kaliski Jr., B.S.1
  • 22
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/171
    • (2003) LNCS , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 24
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 26
    • 38149012093 scopus 로고    scopus 로고
    • Stronger Security of Authenticated Key Exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 29
    • 38049152611 scopus 로고    scopus 로고
    • An enhanced one-round pairing-based tripartite authenticated key agreement protocol
    • Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. Springer, Heidelberg
    • Lim, M.-H., Lee, S., Park, Y.-H., Lee, H.-J.: An enhanced one-round pairing-based tripartite authenticated key agreement protocol. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 503-513. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4706 , pp. 503-513
    • Lim, M.-H.1    Lee, S.2    Park, Y.-H.3    Lee, H.-J.4
  • 30
    • 33744495128 scopus 로고    scopus 로고
    • Secure one-round tripartite authenticated key agreement protocol from Weil pairing
    • Shibata, Y., Shih, T.K. (eds.) IEEE, Los Alamitos
    • Lin, C.-H., Lin, H.-H.: Secure one-round tripartite authenticated key agreement protocol from Weil pairing. In: Shibata, Y., Shih, T.K. (eds.) 19th International Conference on Advanced Information Networking and Applications - AINA 2005, vol. 2, pp. 135-138. IEEE, Los Alamitos (2005)
    • (2005) 19th International Conference on Advanced Information Networking and Applications - AINA 2005 , vol.2 , pp. 135-138
    • Lin, C.-H.1    Lin, H.-H.2
  • 32
    • 70349847680 scopus 로고    scopus 로고
    • Comparing the Pre- and Post-specified Peer Models for Key Agreement
    • Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
    • Menezes, A., Ustaoglu, B.: Comparing the Pre- and Post-specified Peer Models for Key Agreement. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 53-68. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5107 , pp. 53-68
    • Menezes, A.1    Ustaoglu, B.2
  • 33
    • 0037461914 scopus 로고    scopus 로고
    • Efficient one round tripartite authenticated key agreement protocol from Weil pairing
    • Shim, K.: Efficient one round tripartite authenticated key agreement protocol from Weil pairing. IET Electronics Letters 39(2), 208-209 (2003)
    • (2003) IET Electronics Letters , vol.39 , Issue.2 , pp. 208-209
    • Shim, K.1
  • 35
    • 77954589852 scopus 로고    scopus 로고
    • Comparing SessionState Reveal and EphemeralKeyReveal for Diffie-Hellman protocols
    • To appear in
    • Ustaoglu, B.: Comparing SessionState Reveal and EphemeralKeyReveal for Diffie-Hellman protocols. To appear in ProvSec 2009 (2009)
    • ProvSec 2009 (2009)
    • Ustaoglu, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.