Modelling Time for Authenticated Key Exchange Protocols

被引:0
|
作者
Schwenk, Joerg [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
关键词
Authenticated key agreement; timestamps; provable security; OTP; Kerberos; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to model in a Turing machine environment. We propose the first such model, where time is modelled as a global counter T. We argue that this model closely matches several implementations of time in computer environments. The usefulness of the model is shown by giving complexity-theoretic security proofs for OTP protocols and HMQV-like one-round AKE protocols.
引用
收藏
页码:277 / 294
页数:18
相关论文
共 50 条
  • [11] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138
  • [12] Authenticated Key Exchange Protocols Based on Provable Secure Attribute
    Xia, Hui
    Liu, Jie
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
  • [13] Authenticated key exchange protocols resistant to password guessing attacks
    Kwon, T
    Song, J
    IEE PROCEEDINGS-COMMUNICATIONS, 1998, 145 (05): : 304 - 308
  • [14] IDMS quantum password-authenticated key exchange protocols
    Zhang, Lu
    Sun, Yan
    Xu, Yingfei
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 25 (3-4)
  • [15] Password Authenticated Key Exchange and Protected Password Change Protocols
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Chou-Chen
    SYMMETRY-BASEL, 2017, 9 (08):
  • [16] Cryptanalysis of two password authenticated key exchange protocols based on RSA
    Cao, Tianjie
    Lim, Dongdai
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 623 - 625
  • [17] Password authenticated key exchange protocols among diverse network domains
    Yeh, HT
    Sun, HM
    COMPUTERS & ELECTRICAL ENGINEERING, 2005, 31 (03) : 175 - 189
  • [18] Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
    Xiao, Yuting
    Zhang, Rui
    Ma, Hui
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 742 - 772
  • [19] Efficient authenticated key exchange protocols for wireless body area networks
    Liu, Jingwei
    Li, Qian
    Yan, Rui
    Sun, Rong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,
  • [20] The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols
    Eaton, Edward
    Stebila, Douglas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 154 - 173