메뉴 건너뛰기




Volumn 23 CCIS, Issue , 2008, Pages 227-238

Two types of key-compromise impersonation attacks against one-pass key establishment protocols

Author keywords

key compromise impersonation; one pass protocols; one way channel; Two party key establishment

Indexed keywords

NETWORK PROTOCOLS;

EID: 78349295585     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-540-88653-2_17     Document Type: Conference Paper
Times cited : (25)

References (32)
  • 2
    • 85015233534 scopus 로고    scopus 로고
    • Agreement of symmetric algorithm keys using Diffie-Hellman
    • ANSI-X9.42
    • ANSI-X9.42, Agreement of symmetric algorithm keys using Diffie-Hellman. In: Working Draft (1998)
    • (1998) Working Draft
  • 3
    • 78349232894 scopus 로고    scopus 로고
    • Elliptic curve key agreement and key transport protocols
    • ANSI-X9.63
    • ANSI-X9.63, Elliptic curve key agreement and key transport protocols. In: Working Draft (1998)
    • (1998) Working Draft
  • 4
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 85016462400 scopus 로고
    • Systematic design of two-party authentication protocols
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic design of two-party authentication protocols. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 44-61. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 44-61
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7
  • 7
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Darnell, M.J. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30- 45. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 8
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • Tavares, S., Meijer, H. (eds.) SAC 1998. Springer, Heidelberg
    • Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339-361. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1556 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 9
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical Identity Based Encryption with Constant Size Ciphertext
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 10
    • 35048899816 scopus 로고    scopus 로고
    • Key Agreement Using Statically Keyed Authenticators
    • Applied Cryptography and Network Security Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings
    • Boyd, C., Mao, W., Paterson, K.-G.: Key agreement using statically keyed authenticators. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 248-262. Springer, Heidelberg (2004) (Pubitemid 38846744)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , vol.3089 , pp. 248-262
    • Boyd, C.1    Mao, W.2    Paterson, K.G.3
  • 14
    • 36248981438 scopus 로고
    • Cryptographic method and apparatus for public key exchange with authentication
    • U.S. Patent 4956865
    • Goss, K.-C.: Cryptographic method and apparatus for public key exchange with authentication. In: U.S. Patent 4956865 (1990)
    • (1990)
    • Goss, K.-C.1
  • 16
    • 35048878818 scopus 로고    scopus 로고
    • One-Round Protocols for Two-Party Authenticated Key Exchange
    • Applied Cryptography and Network Security Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 2004 Proceedings
    • Jeong, I., Katz, J., Lee, D.: One-round protocols for two-party authenticated key exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220-232. Springer, Heidelberg (2004) (Pubitemid 38846742)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , vol.3089 , pp. 220-232
    • Jeong, I.R.1    Katz, J.2    Lee, D.H.3
  • 17
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key share attack on the mqv key agreement protocol
    • Springer, Heidelberg
    • Kaliski, B.: An unknown key share attack on the mqv key agreement protocol. In: ACM Transactions on Information and System Security, pp. 36-49. Springer, Heidelberg (2001)
    • (2001) ACM Transactions on Information and System Security , pp. 36-49
    • Kaliski, B.1
  • 18
    • 35248831117 scopus 로고    scopus 로고
    • Forward Secrecy in Password-Only Key Exchange Protocols
    • Security in Communication Networks: Third International Conference, SCN 2002 Amalfi, Italy, September 11-13, 2002 Revised Papers
    • Katz, J., Ostrovsky, R., Yung, M.: Forward secrecy in password-only key exchange protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 29-44. Springer, Heidelberg (2002) (Pubitemid 36218554)
    • (2003) LECTURE NOTES in COMPUTER SCIENCE , Issue.2576 , pp. 29-44
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 19
    • 33745179557 scopus 로고    scopus 로고
    • Hmqv: A high-performance secure diffie- Hellman protocol
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Krawczyk, H.: Hmqv: A high-performance secure diffie- hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 27
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
    • Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 29
    • 33745292713 scopus 로고    scopus 로고
    • Security Analysis and Applications of Standard Key Agreement Protocols
    • Computational Science and Its Applications - ICCSA 2003
    • Oh, S., Kwak, J., Lee, S., Won, D.: Security analysis and applications of standard key agreement protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L'Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 191-200. Springer, Heidelberg (2003) (Pubitemid 36658134)
    • (2003) LECTURE NOTES in COMPUTER SCIENCE , Issue.2668 , pp. 191-200
    • Oh, S.1    Kwak, J.2    Lee, S.3    Won, D.4
  • 30
    • 33746215179 scopus 로고    scopus 로고
    • On the resilience of key agreement protocols to key compromise impersonation
    • Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. Springer, Heidelberg
    • Strangio, M.-A.: On the resilience of key agreement protocols to key compromise impersonation. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 233-247. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4043 , pp. 233-247
    • Strangio, M.-A.1
  • 31
    • 40749145773 scopus 로고    scopus 로고
    • Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
    • Report 123,2007
    • Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. In: Cryptology ePrint Archive, Report 123,2007 (2007), http://eprint.iacr.org/2007/123
    • (2007) Cryptology ePrint Archive
    • Ustaoglu, B.1
  • 32
    • 67649704527 scopus 로고    scopus 로고
    • Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange
    • Report 2005/455
    • Zhu, R.W., Tian, X., Wong, D.S.: Enhancing ck-model for key compromise impersonation resilience and identity-based key exchange. Cryptology ePrint Archive, Report 2005/455 (2005), http://eprint.iacr.org/
    • (2005) Cryptology ePrint Archive
    • Zhu, R.W.1    Tian, X.2    Wong, D.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.