Modelling Time for Authenticated Key Exchange Protocols

被引:0
|
作者
Schwenk, Joerg [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
关键词
Authenticated key agreement; timestamps; provable security; OTP; Kerberos; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to model in a Turing machine environment. We propose the first such model, where time is modelled as a global counter T. We argue that this model closely matches several implementations of time in computer environments. The usefulness of the model is shown by giving complexity-theoretic security proofs for OTP protocols and HMQV-like one-round AKE protocols.
引用
收藏
页码:277 / 294
页数:18
相关论文
共 50 条
  • [21] Efficient authenticated key exchange protocols for wireless body area networks
    Jingwei Liu
    Qian Li
    Rui Yan
    Rong Sun
    EURASIP Journal on Wireless Communications and Networking, 2015
  • [22] One-Time-Password-Authenticated Key Exchange
    Paterson, Kenneth G.
    Stebila, Douglas
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 264 - +
  • [23] A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Soriente, Claudio
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1336 - 1353
  • [24] Identity-based Authenticated Key Exchange Protocols from the Tate Pairing
    Shen, Jun
    Jin, Hong
    Yang, Zhiyong
    Cui, Xiang
    FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): COMPUTER VISION AND IMAGE ANALYSIS: PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2012, 8350
  • [25] Feasibility Study for Authenticated Key Exchange Protocols on Underwater Acoustic Sensor Networks
    Petrioli, Chiara
    Saturni, Gabriele
    Spaccini, Daniele
    WUWNET'19: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UNDERWATER NETWORKS & SYSTEMS, 2019,
  • [26] Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
    Lee, Narn-Yih
    Wu, Chien-Nan
    Wang, Chien-Chih
    COMPUTERS & ELECTRICAL ENGINEERING, 2008, 34 (01) : 12 - 20
  • [27] ID2S Password-Authenticated Key Exchange Protocols
    Yi, Xun
    Rao, Fang-Yu
    Tari, Zahir
    Hao, Feng
    Bertino, Elisa
    Khalil, Ibrahim
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (12) : 3687 - 3701
  • [28] Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11): : 2092 - 2095
  • [29] Provably secure authenticated key exchange protocols for low power computing clients
    Wen, HA
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2006, 25 (02) : 106 - 113
  • [30] Provable secure attribute based authenticated key exchange protocols in the standard model
    Wei, Jiang-Hong
    Liu, Wen-Fen
    Hu, Xue-Xian
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (10): : 2397 - 2408