Relations among security models for authenticated key exchange

Jeong Ok Kwon, ik rae Jeong

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Usually, key-establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key-establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key-establishment protocol that is secure in a specific security model into a key-establishment protocol that is still secure in a more restricted security model.

Original languageEnglish
Pages (from-to)856-864
Number of pages9
JournalETRI Journal
Volume36
Issue number5
DOIs
Publication statusPublished - 2014 Jan 1

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science(all)
  • Electronic, Optical and Magnetic Materials

Cite this

Relations among security models for authenticated key exchange. / Kwon, Jeong Ok; Jeong, ik rae.

In: ETRI Journal, Vol. 36, No. 5, 01.01.2014, p. 856-864.

Research output: Contribution to journalArticle

Kwon, Jeong Ok ; Jeong, ik rae. / Relations among security models for authenticated key exchange. In: ETRI Journal. 2014 ; Vol. 36, No. 5. pp. 856-864.
@article{f76a0c8ef055481fafec4b56b442e3f7,
title = "Relations among security models for authenticated key exchange",
abstract = "Usually, key-establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key-establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key-establishment protocol that is secure in a specific security model into a key-establishment protocol that is still secure in a more restricted security model.",
keywords = "Compiler, HMQV, KAM, Key establishment, Security model",
author = "Kwon, {Jeong Ok} and Jeong, {ik rae}",
year = "2014",
month = "1",
day = "1",
doi = "10.4218/etrij.14.0113.1071",
language = "English",
volume = "36",
pages = "856--864",
journal = "ETRI Journal",
issn = "1225-6463",
publisher = "ETRI",
number = "5",

}

TY - JOUR

T1 - Relations among security models for authenticated key exchange

AU - Kwon, Jeong Ok

AU - Jeong, ik rae

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Usually, key-establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key-establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key-establishment protocol that is secure in a specific security model into a key-establishment protocol that is still secure in a more restricted security model.

AB - Usually, key-establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key-establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key-establishment protocol that is secure in a specific security model into a key-establishment protocol that is still secure in a more restricted security model.

KW - Compiler

KW - HMQV

KW - KAM

KW - Key establishment

KW - Security model

UR - http://www.scopus.com/inward/record.url?scp=84907486572&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84907486572&partnerID=8YFLogxK

U2 - 10.4218/etrij.14.0113.1071

DO - 10.4218/etrij.14.0113.1071

M3 - Article

VL - 36

SP - 856

EP - 864

JO - ETRI Journal

JF - ETRI Journal

SN - 1225-6463

IS - 5

ER -