The random oracle methodology, revisited (preliminary version)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Provably secure password-based authentication in TLS
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
How to Hash into Elliptic Curves
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Interactive diffie-hellman assumptions with applications to password-based authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Construction of rational points on elliptic curves over finite fields
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Password-Based authenticated key exchange in the three-party setting
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Simple password-based encrypted key exchange protocols
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A note on chosen-basis decisional diffie-hellman assumptions
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Security analysis of the extended access control protocol for machine readable travel documents
ISC'10 Proceedings of the 13th international conference on Information security
An efficient mobile PACE implementation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Supplemental access control (PACE v2): security analysis of PACE integrated mapping
Cryptography and Security
iPIN and mTAN for secure eID applications
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Domain-Specific pseudonymous signatures for the german identity card
ISC'12 Proceedings of the 15th international conference on Information Security
Options for integrating eID and SAML
Proceedings of the 2013 ACM workshop on Digital identity management
Hi-index | 0.00 |
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deployment in machine readable travel documents. We show that the PACE protocol is secure in the real-or-random sense of Abdalla, Fouque and Pointcheval, under a number-theoretic assumption related to the Diffie-Hellman problem and assuming random oracles and ideal ciphers.