Relations among Security Models for Authenticated Key Exchange

Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen securi...

Full description

Saved in:
Bibliographic Details
Published inETRI journal Vol. 36; no. 5; pp. 856 - 864
Main Authors Kwon, Jeong Ok, Jeong, Ik Rae
Format Journal Article
LanguageEnglish
Published Electronics and Telecommunications Research Institute (ETRI) 01.10.2014
한국전자통신연구원
Subjects
Online AccessGet full text
ISSN1225-6463
2233-7326
DOI10.4218/etrij.14.0113.1071

Cover

Abstract Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key‐establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key‐establishment protocol that is secure in a specific security model into a key‐establishment protocol that is still secure in a more restricted security model.
AbstractList Usually, key-establishment protocols are suggested in asecurity model. However, there exist several differentsecurity models in the literature defined by their respectivesecurity notions. In this paper, we study the relationsbetween the security models of key establishment. For thechosen security models, we first show that some provenkey-establishment protocols are not secure in the morerestricted security models. We then suggest two compilersby which we can convert a key-establishment protocolthat is secure in a specific security model into a keyestablishmentprotocol that is still secure in a morerestricted security model. KCI Citation Count: 1
Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key‐establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key‐establishment protocol that is secure in a specific security model into a key‐establishment protocol that is still secure in a more restricted security model.
Author Kwon, Jeong Ok
Jeong, Ik Rae
Author_xml – sequence: 1
  givenname: Jeong Ok
  surname: Kwon
  fullname: Kwon, Jeong Ok
  email: jeongokkwon@gmail.com
– sequence: 2
  givenname: Ik Rae
  surname: Jeong
  fullname: Jeong, Ik Rae
  email: irjeong@korea.ac.kr
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001915162$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqNkM1OAjEUhRuDiYi-gKtZupmxf9PpbEwIQSViTBDXTencQmFoTWeIzts7gA9g7uJszndy812jgQ8eELojOOOUyAdoo9tmhGeYEJYRXJALNKSUsbRgVAzQkFCap4ILdoWum2aLMcU8l0P0uIBaty74JtH74NfJB5hDdG2XvIUK6iaxISbjQ7sB3zqjW6iSV-iS6Y_ZaL-GG3Rpdd3A7V-O0OfTdDl5Sefvz7PJeJ4aKrFIaVlaY00F2khiS86AFzzXnAsgWgjMCys1q7gp-g-ZoMysZIFNZVdSi_7YCN2fd320amecCtqdch3ULqrxYjlTJSkIKfsqPVdNDE0Twaqv6PY6dopgdZSlTrIU4eooSx1l9ZA8Q9-uhu4fhJouFxTLXLBfW5ZxGw
Cites_doi 10.1145/358722.358740
10.1201/9781439821916
10.1007/3-540-44987-6_28
10.1007/11593447_32
10.1007/3-540-48892-8_26
0.1007/3-540-48329-2_21
10.1007/3-540-46035-7_22
10.1007/978-3-540-76900-2_29
10.1007/3-540-45539-6_11
10.1007/11535218_33
10.1007/978-3-540-45146-4_7
10.1007/11935070_3
10.1016/j.cose.2007.08.001
10.1109/TIT.1976.1055638
10.1007/BFb0024447
10.1145/276698.276854
10.1007/978-3-540-24852-1_16
10.1023/A:1022595222606
10.1007/BF00124891
ContentType Journal Article
Copyright 2014 ETRI
Copyright_xml – notice: 2014 ETRI
DBID AAYXX
CITATION
ACYCR
DOI 10.4218/etrij.14.0113.1071
DatabaseName CrossRef
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 864
ExternalDocumentID oai_kci_go_kr_ARTI_917119
10_4218_etrij_14_0113_1071
ETR20856
Genre article
GrantInformation_xml – fundername: National Research Foundation of Korea (NRF)
– fundername: Ministry of Science, ICT & Future Planning
  funderid: 2013R1A2A2A01068200
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAMMB
AAYXX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
CITATION
OVT
ID FETCH-LOGICAL-c2806-299fcfcdeac81f943e4745a446e1a66047f8a3d4c74633623cb870cdfb8a6a6a3
ISSN 1225-6463
IngestDate Sat Oct 25 08:02:06 EDT 2025
Wed Oct 01 02:46:28 EDT 2025
Wed Jan 22 16:24:00 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c2806-299fcfcdeac81f943e4745a446e1a66047f8a3d4c74633623cb870cdfb8a6a6a3
Notes This work was supported by Basic Science Research Programs through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2013R1A2A2A01068200)
http://etrij.etri.re.kr/etrij/journal/article/article.do?volume=36&issue=5&page=856
G704-001110.2014.36.5.021
OpenAccessLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001915162
PageCount 9
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_917119
crossref_primary_10_4218_etrij_14_0113_1071
wiley_primary_10_4218_etrij_14_0113_1071_ETR20856
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate October 2014
2014-10-01
2014-10
PublicationDateYYYYMMDD 2014-10-01
PublicationDate_xml – month: 10
  year: 2014
  text: October 2014
PublicationDecade 2010
PublicationTitle ETRI journal
PublicationYear 2014
Publisher Electronics and Telecommunications Research Institute (ETRI)
한국전자통신연구원
Publisher_xml – name: Electronics and Telecommunications Research Institute (ETRI)
– name: 한국전자통신연구원
References 1994; 773
1997; 1355
1976; 22
2001
2000
2000; 1807
2007; 4833
1998
2008; 14
1981; 24
2005; 3621
1996
1995
2003; 28
2005; 3788
2004
2003
2006; 4301
2004; 3089
2332
2002
1992; 2
2007; 26
Key-10.4218/etrij.14.0113.1071-7
Key-10.4218/etrij.14.0113.1071-8
Key-10.4218/etrij.14.0113.1071-5
Key-10.4218/etrij.14.0113.1071-6
Key-10.4218/etrij.14.0113.1071-3
Key-10.4218/etrij.14.0113.1071-18
Key-10.4218/etrij.14.0113.1071-4
Key-10.4218/etrij.14.0113.1071-19
Key-10.4218/etrij.14.0113.1071-1
Key-10.4218/etrij.14.0113.1071-2
Key-10.4218/etrij.14.0113.1071-14
Key-10.4218/etrij.14.0113.1071-15
Key-10.4218/etrij.14.0113.1071-16
Key-10.4218/etrij.14.0113.1071-17
Key-10.4218/etrij.14.0113.1071-10
Key-10.4218/etrij.14.0113.1071-11
Key-10.4218/etrij.14.0113.1071-9
Key-10.4218/etrij.14.0113.1071-12
Key-10.4218/etrij.14.0113.1071-13
References_xml – volume: 22
  start-page: 644
  issue: 6
  year: 1976
  end-page: 654
  article-title: New Directions in Cryptography
  publication-title: IEEE Trans. Inf. Theory
– volume: 24
  start-page: 533
  issue: 8
  year: 1981
  end-page: 536
  article-title: Timestamps in Key Distribution Protocols
  publication-title: Commun. ACM
– volume: 3788
  start-page: 585
  year: 2005
  end-page: 604
  article-title: Examining Indistinguishability‐Based Proof Models for Key Establishment Protocols
– start-page: 490
  year: 1996
  end-page: 497
– year: 2001
– year: 2003
– start-page: 22
  year: 1995
  end-page: 32
  article-title: Some New Key Agreement Protocols Providing Mutual Implicit Authentication
– year: 2000
– volume: 1355
  start-page: 30
  year: 1997
  end-page: 45
  article-title: Key Agreement Protocols and their Security Analysis
– volume: 2
  start-page: 107
  issue: 2
  year: 1992
  end-page: 125
  article-title: Authentication and Authenticated Key Exchanges
  publication-title: Des. Codes, Cryptography
– start-page: 339
  year: 1998
  end-page: 361
  article-title: Authenticated Diffie–Hellman Key Agreement Protocols
– volume: 2332
  start-page: 337
  end-page: 351
  article-title: Universally Composable Notions of Key Exchange and Secure Channels
– volume: 773
  start-page: 232
  year: 1994
  end-page: 249
  article-title: Entity Authentication and Key Distribution
– volume: 14
  start-page: 377
  issue: 3
  year: 2008
  end-page: 396
  article-title: Parallel Key Exchange
  publication-title: J. Univ. Comput. Sci.
– volume: 3621
  start-page: 546
  year: 2005
  end-page: 566
  article-title: HMQV: A High‐Performance Secure Diffie–Hellman Protocol
– volume: 3089
  start-page: 220
  year: 2004
  end-page: 232
  article-title: One‐Round Protocols for Two‐Party Authenticated Key Exchange
– volume: 4833
  start-page: 474
  year: 2007
  end-page: 484
  article-title: Authenticated Key Exchange and Key Encapsulation in the Standard Model
– year: 2002
– start-page: 110
  year: 2003
  end-page: 125
  article-title: Scalable Protocols for Authenticated Group Key Exchange
– volume: 4301
  start-page: 37
  year: 2006
  end-page: 54
  article-title: A Diffie–Hellman Key Exchange Protocol without Random Oracles
– start-page: 419
  year: 1998
  end-page: 428
  article-title: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
– volume: 28
  start-page: 119
  issue: 2
  year: 2003
  end-page: 134
  article-title: An Efficient Protocol for Authenticated Key Agreement
  publication-title: Des. Codes Cryptography
– year: 2004
– start-page: 453
  year: 2001
  end-page: 474
  article-title: Analysis of Key‐Exchange Protocols and Their Use for Building Secure Channels
– volume: 26
  start-page: 452
  issue: 7–8
  year: 2007
  end-page: 458
  article-title: Key Agreement for Key Hypergraph
  publication-title: Comput. Sec.
– volume: 1807
  start-page: 139
  year: 2000
  end-page: 155
  article-title: Authenticated Key Exchange Secure against Dictionary Attacks
– ident: Key-10.4218/etrij.14.0113.1071-5
  doi: 10.1145/358722.358740
– ident: Key-10.4218/etrij.14.0113.1071-18
  doi: 10.1201/9781439821916
– ident: Key-10.4218/etrij.14.0113.1071-8
  doi: 10.1007/3-540-44987-6_28
– ident: Key-10.4218/etrij.14.0113.1071-13
  doi: 10.1007/11593447_32
– ident: Key-10.4218/etrij.14.0113.1071-6
  doi: 10.1007/3-540-48892-8_26
– ident: Key-10.4218/etrij.14.0113.1071-1
  doi: 0.1007/3-540-48329-2_21
– ident: Key-10.4218/etrij.14.0113.1071-12
  doi: 10.1007/3-540-46035-7_22
– ident: Key-10.4218/etrij.14.0113.1071-14
  doi: 10.1007/978-3-540-76900-2_29
– ident: Key-10.4218/etrij.14.0113.1071-19
  doi: 10.1007/3-540-45539-6_11
– ident: Key-10.4218/etrij.14.0113.1071-2
  doi: 10.1007/11535218_33
– ident: Key-10.4218/etrij.14.0113.1071-15
  doi: 10.1007/978-3-540-45146-4_7
– ident: Key-10.4218/etrij.14.0113.1071-16
  doi: 10.1007/11935070_3
– ident: Key-10.4218/etrij.14.0113.1071-17
  doi: 10.1016/j.cose.2007.08.001
– ident: Key-10.4218/etrij.14.0113.1071-4
  doi: 10.1109/TIT.1976.1055638
– ident: Key-10.4218/etrij.14.0113.1071-11
  doi: 10.1007/BFb0024447
– ident: Key-10.4218/etrij.14.0113.1071-10
  doi: 10.1145/276698.276854
– ident: Key-10.4218/etrij.14.0113.1071-3
  doi: 10.1007/978-3-540-24852-1_16
– ident: Key-10.4218/etrij.14.0113.1071-7
  doi: 10.1023/A:1022595222606
– ident: Key-10.4218/etrij.14.0113.1071-9
  doi: 10.1007/BF00124891
SSID ssj0020458
Score 2.0025544
Snippet Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by...
Usually, key-establishment protocols are suggested in asecurity model. However, there exist several differentsecurity models in the literature defined by their...
SourceID nrf
crossref
wiley
SourceType Open Website
Index Database
Publisher
StartPage 856
SubjectTerms compiler
HMQV
KAM
Key establishment
security model
전자/정보통신공학
Title Relations among Security Models for Authenticated Key Exchange
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.14.0113.1071
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001915162
Volume 36
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2014, 36(5), , pp.856-864
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: KQ8
  dateStart: 19930101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: ADMLS
  dateStart: 20090601
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: KBPluse Wiley Online Library: Open Access
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: AVUZU
  dateStart: 19930401
  isFulltext: true
  titleUrlDefault: https://www.kbplus.ac.uk/kbplus7/publicExport/pkg/559
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LjtMw0CrdCxwQT1FeMhI-VSlJ7TjOBSlJg3ZBcIAWrbhYieOsVou6qOpKiG_go5lxkiZdQCq0UmQ5ydiZGc_DjxlCXvIIfmVdebXllSdUxT0w6gsPV-AM6K-wdIfE3n-Qxyvx9jQ8HY1-DnYtXW3Lmfnxx3Ml_0NVqAO64inZf6DsDihUQBnoC1egMFwPonG_k63JGfSpTUbnMpx9dZEWpjgHhjuCcOdTNX0HIiD_brojBf2k_PLjyXTYJtCA5QlLJVMZyzOW-CwOsRArloT9I8M7C5ZCIWVxzpqcz910QiB2G9MaBmD5Al-KM9dGyJJFC0kJBwkA-PiMkg5kxlSKd_FWxFK_e8v1LIYG_YFsBdHhSdHKM-vqwDjhXsTnQxmqQjlUx02Q8-uSXoBpgjTfbs5R2s9ATPEZuLJBr9e6tfxr6m4vsPaFOddnl_pio8F9ONHguwYYQ_ZoDjrCH5Oj5PPqy2rnwOOiMjrw3Yc0h7CwK69-78ieoXNjvan33R9nvyzvkNut40GThovukpFd3yO3BuEo75PXO36ijp9ox0-04ScK_ET3-IkCP9GOnx6Q1Zt8mR17bX4Nz-B6ugeWSG1qU4HuVUEdC25FJMJCCGmDQkpfRLUqeCVMBN8Khg43JUh3U9WlKiT8-UMyXl-u7SNCy5oXFQz6wAJLzeOitNYKXxWxX4ooUuGETDtk6G9NGBUN7ieiTjvUgQuqEXUaUTchLwBfjjh_JdKEBA6bB4DTMIYwFa18fADcJ-RmPyyekvF2c2Wfgd25LZ-37PALkHZvmw
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5qe1AP4hPrcwVvEm3czesiFElp7eOgjRQvS5LdlVJpJVbQf-9MkhbFi5gccspCvt3JfN_uPADOuYdXYpRlNFeW8BW3kNTHFp3Apei_nCRPEusP3HYk7kbOqALhIhemqA-x3HAjy8j_12TgtCFNVi7QLdEszrMxWfolLlGOKpQyyWsO-acq1JqP0VO0VF50GkjKCxev5QqXF9kzNM7V71F-eKiVaWZ-8tbc8bQ2YaNkjKxZTPEWVPR0G9a_1RHcgZtlSBvLmwexh7IrHaNWZy9vDJkpo80wCg2iECjFuvqThR9F2u8uRK1weNu2ysYIVkoHoRa6EJOaVOFP07dNILgWnnBiVHbajl23ITzjx1yJ1MNvRQ_F0wTNMlUm8WMXb74H1elsqveBJYbHCmfL1qiVroM40VqLhh8HjUR4nu_U4WIBhnwt6l9I1A0EncyhQ-0gCTpJ0NXhDPGSk3QsqWw1PZ9ncpJJJOcdicrQtoM62DmafxhOhsN76iHqHvzjnVNYbQ_7PdnrDLqHsIZERxRBeEdQnWfv-hjJxDw5KZfKF3liwRk
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5qC6IH8Yn1uYI3iTbu5nURira0VotoK8XLkmR3pVTSEivov3cmSYvFi5gccspCvt3Z-b7sPABOuYdXZJRlNFeW8BW3kNSHFp3Axei_nChLErvvuq2-uB04gxI0ZrkweX2I-Q83soxsvyYD1xNlyMoFuiWaxWk6JEs_xyXKUYVSJnkFHXpNlKFSf-6_9OfKi04DSXnh4rVc4fI8e4bGufg9yoKHWkpSs8hbM8fTXIe1gjGyej7FG1DSySas_qgjuAVX85A2ljUPYk9FVzpGrc7e3hkyU0Y_wyg0iEKgFOvoL9b4zNN-t6HfbPSuW1bRGMGK6SDUQhdiYhMr3DR92wSCa-EJJ0Rlp-3QdWvCM37IlYg9_Fb0UDyO0CxjZSI_dPHmO1BOxoneBRYZHiqcLVujVroMwkhrLWp-GNQi4Xm-U4WzGRhykte_kKgbCDqZQYfaQRJ0kqCrwgniJUfxUFLZanq-juUolUjO2xKVoW0HVbAzNP8wnGz0HqmHqLv3j3eOYfnhpinv2t3OPqwgzxF5DN4BlKfphz5ELjGNjoqV8g2BlsCo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Relations+among+Security+Models+for+Authenticated+Key+Exchange&rft.jtitle=ETRI+journal&rft.au=%EA%B6%8C%EC%A0%95%EC%98%A5&rft.au=%EC%A0%95%EC%9D%B5%EB%9E%98&rft.date=2014-10-01&rft.pub=%ED%95%9C%EA%B5%AD%EC%A0%84%EC%9E%90%ED%86%B5%EC%8B%A0%EC%97%B0%EA%B5%AC%EC%9B%90&rft.issn=1225-6463&rft.eissn=2233-7326&rft.spage=856&rft.epage=864&rft_id=info:doi/10.4218%2Fetrij.14.0113.1071&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_917119
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon