Relations among Security Models for Authenticated Key Exchange

Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen securi...

Full description

Saved in:
Bibliographic Details
Published inETRI journal Vol. 36; no. 5; pp. 856 - 864
Main Authors Kwon, Jeong Ok, Jeong, Ik Rae
Format Journal Article
LanguageEnglish
Published Electronics and Telecommunications Research Institute (ETRI) 01.10.2014
한국전자통신연구원
Subjects
Online AccessGet full text
ISSN1225-6463
2233-7326
DOI10.4218/etrij.14.0113.1071

Cover

More Information
Summary:Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key‐establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key‐establishment protocol that is secure in a specific security model into a key‐establishment protocol that is still secure in a more restricted security model.
Bibliography:This work was supported by Basic Science Research Programs through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2013R1A2A2A01068200)
http://etrij.etri.re.kr/etrij/journal/article/article.do?volume=36&issue=5&page=856
G704-001110.2014.36.5.021
ISSN:1225-6463
2233-7326
DOI:10.4218/etrij.14.0113.1071