on session key construction in provably-secure key establishment protocols revisiting chen文档.pdfVIP
- 1、本文档共16页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
on session key construction in provably-secure key establishment protocols revisiting chen文档
On Session Key Construction in Provably-Secure
Key Establishment Protocols⋆
Kim-Kwang Raymond Choo, Colin Boyd, and Yvonne Hitchcock
Information Security Institute
Queensland University of Technology
GPO Box 2434, Brisbane, QLD 4001, Australia
{k.choo,c.boyd,y.hitchcock}@.au
Abstract. We examine the role of session key construction in provably-
secure key establishment protocols. We revisit an ID-based key establish-
ment protocol due to Chen Kudla (2003) and an ID-based protocol
2P-IDAKA due to McCullagh Barreto (2005). Both protocols carry
proofs of security in a weaker variant of the Bellare Rogaway (1993)
model where the adversary is not allowed to make any Reveal query.
We advocate the importance of such a (Reveal) query as it captures
the known-key security requirement. We then demonstrate that a small
change to the way that session keys are constructed in both protocols
results in these protocols being secure without restricting the adversary
from asking the Reveal queries in most situations. We point out some
errors in the existing proof for protocol 2P-IDAKA, and provide proof
sketches for the improved Chen Kudla’s protocol. We conclude with a
brief discussion on ways to construct session keys in key establishment
protocols.
1 Introduction
Key establishment protocols are used for distributing shared keying material in
a secure manner. For example, today’s cryptosystems, such as AES, use key es-
tablishment schemes to establish shared keying material. However, despite their
importance, the difficulties of obtaining a high level of assurance in the security
of almost any new, or ev
您可能关注的文档
- National Protocols for Test Administration 2013 - NAP文档.pdf
- NEBOSH International Diploma in Occupational Health and Safety Unit A ia5文档.pdf
- NEBOSH International Diploma in Occupational Health and Safety Unit A ia3文档.pdf
- Negative Goodwill Issues of Financial Reporting and Analysis….pdf
- nature20101-Hybrid computing using a neural network with dynamic external memory文档.pdf
- Neal R Bayesian Learning for Neural Networks 1996文档.pdf
- new perspectives on argument structure in functional grammar () on the syntax-semantics interface in word formation the case of english -er nominalizations文档.pdf
- New York 1927 - Blackstone Chess文档.pdf
- Non-Ferrous Extractive Metallurgy Prof. H. S. Ray ...文档.pdf
- Numerical analysis of welding residual stress and distortion….pdf
- On the possibilistic approach to linear regression models….pdf
- Off-axis collimation of diode laser beams by means of single-element holographic diffractive optics文档.pdf
- opportunistic spectrum sharing in cognitive mimo wireless networks文档.pdf
- Operation on Low-Sulphur Fuels MAN B&W Two-stroke Engines文档.pdf
- optical properties of rare-earth doped fluorozirconate glass-ceramics for x-ray detector applications精品.pdf
- Oppenheim - Signals and systems 2ed- Solution Manual文档.pdf
- Options, Futures, Derivatives - School of Mathematics :期权,期货,衍生产品——数学学院.pdf
- Organizational adoption behavior of CO2-saving power train technologies An empirical study on the German heavy-duty vehicles market文档.pdf
- Organizing AA and ICP Data for Regulatory Compliance, Reporting, and Archiving文档.pdf
- Overview of the Global Positioning System (GPS)文档.pdf
最近下载
- 通桥(2019)2131-Ⅲ 时速160km客货共线铁路简支箱梁(单线)跨度:23.5m(直、曲线).pdf
- 高一物理-折合质量法求解完全非弹性碰撞.pdf VIP
- 2023-2024学年北京北师大附中新高一分班考物理试题及答案.docx VIP
- “工人阶级重要论述”及“工会十八大精神”知识竞赛试题附答案.doc VIP
- 上海某温室大棚空调方案设计说明.pdf VIP
- 市政府办公楼扩建改造项目投资建设可行性研究报告.doc VIP
- 卫生间丙纶布防水施工方案.doc VIP
- 成都地铁基坑围护结构钢支撑的应力监测分析.pdf VIP
- 2024湖北农谷实业集团有限责任公司招聘试题及答案解析.docx
- 新生儿呼吸心跳骤停新生儿重度窒息死亡病例讨论记录模板.doc VIP
文档评论(0)