Relations among Security Models for Authenticated Key Exchange
Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen securi...
Saved in:
| Published in | ETRI journal Vol. 36; no. 5; pp. 856 - 864 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Electronics and Telecommunications Research Institute (ETRI)
01.10.2014
한국전자통신연구원 |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1225-6463 2233-7326 |
| DOI | 10.4218/etrij.14.0113.1071 |
Cover
| Abstract | Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key‐establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key‐establishment protocol that is secure in a specific security model into a key‐establishment protocol that is still secure in a more restricted security model. |
|---|---|
| AbstractList | Usually, key-establishment protocols are suggested in asecurity model. However, there exist several differentsecurity models in the literature defined by their respectivesecurity notions. In this paper, we study the relationsbetween the security models of key establishment. For thechosen security models, we first show that some provenkey-establishment protocols are not secure in the morerestricted security models. We then suggest two compilersby which we can convert a key-establishment protocolthat is secure in a specific security model into a keyestablishmentprotocol that is still secure in a morerestricted security model. KCI Citation Count: 1 Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key‐establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key‐establishment protocol that is secure in a specific security model into a key‐establishment protocol that is still secure in a more restricted security model. |
| Author | Kwon, Jeong Ok Jeong, Ik Rae |
| Author_xml | – sequence: 1 givenname: Jeong Ok surname: Kwon fullname: Kwon, Jeong Ok email: jeongokkwon@gmail.com – sequence: 2 givenname: Ik Rae surname: Jeong fullname: Jeong, Ik Rae email: irjeong@korea.ac.kr |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001915162$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqNkM1OAjEUhRuDiYi-gKtZupmxf9PpbEwIQSViTBDXTencQmFoTWeIzts7gA9g7uJszndy812jgQ8eELojOOOUyAdoo9tmhGeYEJYRXJALNKSUsbRgVAzQkFCap4ILdoWum2aLMcU8l0P0uIBaty74JtH74NfJB5hDdG2XvIUK6iaxISbjQ7sB3zqjW6iSV-iS6Y_ZaL-GG3Rpdd3A7V-O0OfTdDl5Sefvz7PJeJ4aKrFIaVlaY00F2khiS86AFzzXnAsgWgjMCys1q7gp-g-ZoMysZIFNZVdSi_7YCN2fd320amecCtqdch3ULqrxYjlTJSkIKfsqPVdNDE0Twaqv6PY6dopgdZSlTrIU4eooSx1l9ZA8Q9-uhu4fhJouFxTLXLBfW5ZxGw |
| Cites_doi | 10.1145/358722.358740 10.1201/9781439821916 10.1007/3-540-44987-6_28 10.1007/11593447_32 10.1007/3-540-48892-8_26 0.1007/3-540-48329-2_21 10.1007/3-540-46035-7_22 10.1007/978-3-540-76900-2_29 10.1007/3-540-45539-6_11 10.1007/11535218_33 10.1007/978-3-540-45146-4_7 10.1007/11935070_3 10.1016/j.cose.2007.08.001 10.1109/TIT.1976.1055638 10.1007/BFb0024447 10.1145/276698.276854 10.1007/978-3-540-24852-1_16 10.1023/A:1022595222606 10.1007/BF00124891 |
| ContentType | Journal Article |
| Copyright | 2014 ETRI |
| Copyright_xml | – notice: 2014 ETRI |
| DBID | AAYXX CITATION ACYCR |
| DOI | 10.4218/etrij.14.0113.1071 |
| DatabaseName | CrossRef Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2233-7326 |
| EndPage | 864 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_917119 10_4218_etrij_14_0113_1071 ETR20856 |
| Genre | article |
| GrantInformation_xml | – fundername: National Research Foundation of Korea (NRF) – fundername: Ministry of Science, ICT & Future Planning funderid: 2013R1A2A2A01068200 |
| GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAMMB AAYXX ADMLS AEFGJ AGXDD AIDQK AIDYY CITATION OVT |
| ID | FETCH-LOGICAL-c2806-299fcfcdeac81f943e4745a446e1a66047f8a3d4c74633623cb870cdfb8a6a6a3 |
| ISSN | 1225-6463 |
| IngestDate | Sat Oct 25 08:02:06 EDT 2025 Wed Oct 01 02:46:28 EDT 2025 Wed Jan 22 16:24:00 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c2806-299fcfcdeac81f943e4745a446e1a66047f8a3d4c74633623cb870cdfb8a6a6a3 |
| Notes | This work was supported by Basic Science Research Programs through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2013R1A2A2A01068200) http://etrij.etri.re.kr/etrij/journal/article/article.do?volume=36&issue=5&page=856 G704-001110.2014.36.5.021 |
| OpenAccessLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001915162 |
| PageCount | 9 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_917119 crossref_primary_10_4218_etrij_14_0113_1071 wiley_primary_10_4218_etrij_14_0113_1071_ETR20856 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | October 2014 2014-10-01 2014-10 |
| PublicationDateYYYYMMDD | 2014-10-01 |
| PublicationDate_xml | – month: 10 year: 2014 text: October 2014 |
| PublicationDecade | 2010 |
| PublicationTitle | ETRI journal |
| PublicationYear | 2014 |
| Publisher | Electronics and Telecommunications Research Institute (ETRI) 한국전자통신연구원 |
| Publisher_xml | – name: Electronics and Telecommunications Research Institute (ETRI) – name: 한국전자통신연구원 |
| References | 1994; 773 1997; 1355 1976; 22 2001 2000 2000; 1807 2007; 4833 1998 2008; 14 1981; 24 2005; 3621 1996 1995 2003; 28 2005; 3788 2004 2003 2006; 4301 2004; 3089 2332 2002 1992; 2 2007; 26 Key-10.4218/etrij.14.0113.1071-7 Key-10.4218/etrij.14.0113.1071-8 Key-10.4218/etrij.14.0113.1071-5 Key-10.4218/etrij.14.0113.1071-6 Key-10.4218/etrij.14.0113.1071-3 Key-10.4218/etrij.14.0113.1071-18 Key-10.4218/etrij.14.0113.1071-4 Key-10.4218/etrij.14.0113.1071-19 Key-10.4218/etrij.14.0113.1071-1 Key-10.4218/etrij.14.0113.1071-2 Key-10.4218/etrij.14.0113.1071-14 Key-10.4218/etrij.14.0113.1071-15 Key-10.4218/etrij.14.0113.1071-16 Key-10.4218/etrij.14.0113.1071-17 Key-10.4218/etrij.14.0113.1071-10 Key-10.4218/etrij.14.0113.1071-11 Key-10.4218/etrij.14.0113.1071-9 Key-10.4218/etrij.14.0113.1071-12 Key-10.4218/etrij.14.0113.1071-13 |
| References_xml | – volume: 22 start-page: 644 issue: 6 year: 1976 end-page: 654 article-title: New Directions in Cryptography publication-title: IEEE Trans. Inf. Theory – volume: 24 start-page: 533 issue: 8 year: 1981 end-page: 536 article-title: Timestamps in Key Distribution Protocols publication-title: Commun. ACM – volume: 3788 start-page: 585 year: 2005 end-page: 604 article-title: Examining Indistinguishability‐Based Proof Models for Key Establishment Protocols – start-page: 490 year: 1996 end-page: 497 – year: 2001 – year: 2003 – start-page: 22 year: 1995 end-page: 32 article-title: Some New Key Agreement Protocols Providing Mutual Implicit Authentication – year: 2000 – volume: 1355 start-page: 30 year: 1997 end-page: 45 article-title: Key Agreement Protocols and their Security Analysis – volume: 2 start-page: 107 issue: 2 year: 1992 end-page: 125 article-title: Authentication and Authenticated Key Exchanges publication-title: Des. Codes, Cryptography – start-page: 339 year: 1998 end-page: 361 article-title: Authenticated Diffie–Hellman Key Agreement Protocols – volume: 2332 start-page: 337 end-page: 351 article-title: Universally Composable Notions of Key Exchange and Secure Channels – volume: 773 start-page: 232 year: 1994 end-page: 249 article-title: Entity Authentication and Key Distribution – volume: 14 start-page: 377 issue: 3 year: 2008 end-page: 396 article-title: Parallel Key Exchange publication-title: J. Univ. Comput. Sci. – volume: 3621 start-page: 546 year: 2005 end-page: 566 article-title: HMQV: A High‐Performance Secure Diffie–Hellman Protocol – volume: 3089 start-page: 220 year: 2004 end-page: 232 article-title: One‐Round Protocols for Two‐Party Authenticated Key Exchange – volume: 4833 start-page: 474 year: 2007 end-page: 484 article-title: Authenticated Key Exchange and Key Encapsulation in the Standard Model – year: 2002 – start-page: 110 year: 2003 end-page: 125 article-title: Scalable Protocols for Authenticated Group Key Exchange – volume: 4301 start-page: 37 year: 2006 end-page: 54 article-title: A Diffie–Hellman Key Exchange Protocol without Random Oracles – start-page: 419 year: 1998 end-page: 428 article-title: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols – volume: 28 start-page: 119 issue: 2 year: 2003 end-page: 134 article-title: An Efficient Protocol for Authenticated Key Agreement publication-title: Des. Codes Cryptography – year: 2004 – start-page: 453 year: 2001 end-page: 474 article-title: Analysis of Key‐Exchange Protocols and Their Use for Building Secure Channels – volume: 26 start-page: 452 issue: 7–8 year: 2007 end-page: 458 article-title: Key Agreement for Key Hypergraph publication-title: Comput. Sec. – volume: 1807 start-page: 139 year: 2000 end-page: 155 article-title: Authenticated Key Exchange Secure against Dictionary Attacks – ident: Key-10.4218/etrij.14.0113.1071-5 doi: 10.1145/358722.358740 – ident: Key-10.4218/etrij.14.0113.1071-18 doi: 10.1201/9781439821916 – ident: Key-10.4218/etrij.14.0113.1071-8 doi: 10.1007/3-540-44987-6_28 – ident: Key-10.4218/etrij.14.0113.1071-13 doi: 10.1007/11593447_32 – ident: Key-10.4218/etrij.14.0113.1071-6 doi: 10.1007/3-540-48892-8_26 – ident: Key-10.4218/etrij.14.0113.1071-1 doi: 0.1007/3-540-48329-2_21 – ident: Key-10.4218/etrij.14.0113.1071-12 doi: 10.1007/3-540-46035-7_22 – ident: Key-10.4218/etrij.14.0113.1071-14 doi: 10.1007/978-3-540-76900-2_29 – ident: Key-10.4218/etrij.14.0113.1071-19 doi: 10.1007/3-540-45539-6_11 – ident: Key-10.4218/etrij.14.0113.1071-2 doi: 10.1007/11535218_33 – ident: Key-10.4218/etrij.14.0113.1071-15 doi: 10.1007/978-3-540-45146-4_7 – ident: Key-10.4218/etrij.14.0113.1071-16 doi: 10.1007/11935070_3 – ident: Key-10.4218/etrij.14.0113.1071-17 doi: 10.1016/j.cose.2007.08.001 – ident: Key-10.4218/etrij.14.0113.1071-4 doi: 10.1109/TIT.1976.1055638 – ident: Key-10.4218/etrij.14.0113.1071-11 doi: 10.1007/BFb0024447 – ident: Key-10.4218/etrij.14.0113.1071-10 doi: 10.1145/276698.276854 – ident: Key-10.4218/etrij.14.0113.1071-3 doi: 10.1007/978-3-540-24852-1_16 – ident: Key-10.4218/etrij.14.0113.1071-7 doi: 10.1023/A:1022595222606 – ident: Key-10.4218/etrij.14.0113.1071-9 doi: 10.1007/BF00124891 |
| SSID | ssj0020458 |
| Score | 2.0025544 |
| Snippet | Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by... Usually, key-establishment protocols are suggested in asecurity model. However, there exist several differentsecurity models in the literature defined by their... |
| SourceID | nrf crossref wiley |
| SourceType | Open Website Index Database Publisher |
| StartPage | 856 |
| SubjectTerms | compiler HMQV KAM Key establishment security model 전자/정보통신공학 |
| Title | Relations among Security Models for Authenticated Key Exchange |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.14.0113.1071 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001915162 |
| Volume | 36 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | ETRI Journal, 2014, 36(5), , pp.856-864 |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: KQ8 dateStart: 19930101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: ADMLS dateStart: 20090601 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: KBPluse Wiley Online Library: Open Access customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: AVUZU dateStart: 19930401 isFulltext: true titleUrlDefault: https://www.kbplus.ac.uk/kbplus7/publicExport/pkg/559 providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LjtMw0CrdCxwQT1FeMhI-VSlJ7TjOBSlJg3ZBcIAWrbhYieOsVou6qOpKiG_go5lxkiZdQCq0UmQ5ydiZGc_DjxlCXvIIfmVdebXllSdUxT0w6gsPV-AM6K-wdIfE3n-Qxyvx9jQ8HY1-DnYtXW3Lmfnxx3Ml_0NVqAO64inZf6DsDihUQBnoC1egMFwPonG_k63JGfSpTUbnMpx9dZEWpjgHhjuCcOdTNX0HIiD_brojBf2k_PLjyXTYJtCA5QlLJVMZyzOW-CwOsRArloT9I8M7C5ZCIWVxzpqcz910QiB2G9MaBmD5Al-KM9dGyJJFC0kJBwkA-PiMkg5kxlSKd_FWxFK_e8v1LIYG_YFsBdHhSdHKM-vqwDjhXsTnQxmqQjlUx02Q8-uSXoBpgjTfbs5R2s9ATPEZuLJBr9e6tfxr6m4vsPaFOddnl_pio8F9ONHguwYYQ_ZoDjrCH5Oj5PPqy2rnwOOiMjrw3Yc0h7CwK69-78ieoXNjvan33R9nvyzvkNut40GThovukpFd3yO3BuEo75PXO36ijp9ox0-04ScK_ET3-IkCP9GOnx6Q1Zt8mR17bX4Nz-B6ugeWSG1qU4HuVUEdC25FJMJCCGmDQkpfRLUqeCVMBN8Khg43JUh3U9WlKiT8-UMyXl-u7SNCy5oXFQz6wAJLzeOitNYKXxWxX4ooUuGETDtk6G9NGBUN7ieiTjvUgQuqEXUaUTchLwBfjjh_JdKEBA6bB4DTMIYwFa18fADcJ-RmPyyekvF2c2Wfgd25LZ-37PALkHZvmw |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5qe1AP4hPrcwVvEm3czesiFElp7eOgjRQvS5LdlVJpJVbQf-9MkhbFi5gccspCvt3JfN_uPADOuYdXYpRlNFeW8BW3kNTHFp3Apei_nCRPEusP3HYk7kbOqALhIhemqA-x3HAjy8j_12TgtCFNVi7QLdEszrMxWfolLlGOKpQyyWsO-acq1JqP0VO0VF50GkjKCxev5QqXF9kzNM7V71F-eKiVaWZ-8tbc8bQ2YaNkjKxZTPEWVPR0G9a_1RHcgZtlSBvLmwexh7IrHaNWZy9vDJkpo80wCg2iECjFuvqThR9F2u8uRK1weNu2ysYIVkoHoRa6EJOaVOFP07dNILgWnnBiVHbajl23ITzjx1yJ1MNvRQ_F0wTNMlUm8WMXb74H1elsqveBJYbHCmfL1qiVroM40VqLhh8HjUR4nu_U4WIBhnwt6l9I1A0EncyhQ-0gCTpJ0NXhDPGSk3QsqWw1PZ9ncpJJJOcdicrQtoM62DmafxhOhsN76iHqHvzjnVNYbQ_7PdnrDLqHsIZERxRBeEdQnWfv-hjJxDw5KZfKF3liwRk |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5qC6IH8Yn1uYI3iTbu5nURira0VotoK8XLkmR3pVTSEivov3cmSYvFi5gccspCvt3Z-b7sPABOuYdXZJRlNFeW8BW3kNSHFp3Axei_nChLErvvuq2-uB04gxI0ZrkweX2I-Q83soxsvyYD1xNlyMoFuiWaxWk6JEs_xyXKUYVSJnkFHXpNlKFSf-6_9OfKi04DSXnh4rVc4fI8e4bGufg9yoKHWkpSs8hbM8fTXIe1gjGyej7FG1DSySas_qgjuAVX85A2ljUPYk9FVzpGrc7e3hkyU0Y_wyg0iEKgFOvoL9b4zNN-t6HfbPSuW1bRGMGK6SDUQhdiYhMr3DR92wSCa-EJJ0Rlp-3QdWvCM37IlYg9_Fb0UDyO0CxjZSI_dPHmO1BOxoneBRYZHiqcLVujVroMwkhrLWp-GNQi4Xm-U4WzGRhykte_kKgbCDqZQYfaQRJ0kqCrwgniJUfxUFLZanq-juUolUjO2xKVoW0HVbAzNP8wnGz0HqmHqLv3j3eOYfnhpinv2t3OPqwgzxF5DN4BlKfphz5ELjGNjoqV8g2BlsCo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Relations+among+Security+Models+for+Authenticated+Key+Exchange&rft.jtitle=ETRI+journal&rft.au=%EA%B6%8C%EC%A0%95%EC%98%A5&rft.au=%EC%A0%95%EC%9D%B5%EB%9E%98&rft.date=2014-10-01&rft.pub=%ED%95%9C%EA%B5%AD%EC%A0%84%EC%9E%90%ED%86%B5%EC%8B%A0%EC%97%B0%EA%B5%AC%EC%9B%90&rft.issn=1225-6463&rft.eissn=2233-7326&rft.spage=856&rft.epage=864&rft_id=info:doi/10.4218%2Fetrij.14.0113.1071&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_917119 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |