Modelling Time for Authenticated Key Exchange Protocols

被引:0
|
作者
Schwenk, Joerg [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
关键词
Authenticated key agreement; timestamps; provable security; OTP; Kerberos; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to model in a Turing machine environment. We propose the first such model, where time is modelled as a global counter T. We argue that this model closely matches several implementations of time in computer environments. The usefulness of the model is shown by giving complexity-theoretic security proofs for OTP protocols and HMQV-like one-round AKE protocols.
引用
收藏
页码:277 / 294
页数:18
相关论文
共 50 条
  • [31] DAKEs: Decentralized Authenticated Key Exchange Protocols via Blockchain for Smart City
    Wu, Qiong
    Luo, Yi
    Zhao, Ying
    Qian, Bin
    Guo, Bin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] One-round protocols for two-party authenticated key exchange
    Jeong, IR
    Katz, J
    Lee, DH
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 220 - 232
  • [33] An authenticated key exchange mechanism using one-time shared key
    Lee, Y
    Choi, EM
    Min, D
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 187 - 194
  • [34] Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Paik, Juryon
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 47 - 57
  • [35] Integrating identity-based and certificate-based authenticated key exchange protocols
    Berkant Ustaoğlu
    International Journal of Information Security, 2011, 10 : 201 - 212
  • [36] Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
    Lee, Yunho
    Kim, Seungjoo
    Won, Dongho
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (01) : 213 - 223
  • [37] Cryptanalysis of server-aided password-based authenticated key exchange protocols
    Won, D. (dhwon@security.re.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [38] Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols based on Two Hard Problems
    Do Viet Binh
    Nguyen Hieu Minh
    Nguyen Nam Hai
    Hur, Junbeom
    Dang Hoang Minh
    Ho Sy Tan
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2017, : 16 - 22
  • [39] Integrating identity-based and certificate-based authenticated key exchange protocols
    Ustaoglu, Berkant
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (04) : 201 - 212
  • [40] Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols
    Luo, Min
    Zhou, Xiaotong
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2017, 5 : 8017 - 8024