Modelling Time for Authenticated Key Exchange Protocols

被引:0
|
作者
Schwenk, Joerg [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
关键词
Authenticated key agreement; timestamps; provable security; OTP; Kerberos; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to model in a Turing machine environment. We propose the first such model, where time is modelled as a global counter T. We argue that this model closely matches several implementations of time in computer environments. The usefulness of the model is shown by giving complexity-theoretic security proofs for OTP protocols and HMQV-like one-round AKE protocols.
引用
收藏
页码:277 / 294
页数:18
相关论文
共 50 条
  • [1] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [2] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [3] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [4] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
  • [5] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [6] Authenticated Key Exchange Protocols Based on Factoring Assumption
    Huang, Hai
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
  • [7] Enhanced Modelling of Authenticated Key Exchange Security
    Seye, Papa B.
    Sarr, Augustin P.
    SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 36 - 52
  • [8] Elliptic curve based password authenticated key exchange protocols
    Boyd, C
    Montague, P
    Nguyen, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 487 - 501
  • [9] Cryptanalysis of two password-authenticated key exchange protocols
    Wan, ZG
    Wang, SH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 164 - 175
  • [10] Authenticated Key Exchange Protocols for Parallel Network File Systems
    Lim, Hoon Wei
    Yang, Guomin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) : 92 - 105