How to construct random functions
Journal of the ACM (JACM)
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Using encryption for authentication in large networks of computers
Communications of the ACM
Secret-Key Agreement without Public-Key Cryptography
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Nark: receiver-based multicast non-repudiation and key management
Proceedings of the 1st ACM conference on Electronic commerce
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Mechanising a Protocol for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Lack of Explicitness Strikes Back
Revised Papers from the 8th International Workshop on Security Protocols
Practice-Oriented Provable Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Inductive verification of smart card protocols
Journal of Computer Security
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
A Family of Trusted Third Party Based Fair-Exchange Protocols
IEEE Transactions on Dependable and Secure Computing
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Smartcard integration with Kerberos V5
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
Proceedings of the 15th ACM conference on Computer and communications security
Provably secure authenticated key exchange protocol under the CDH assumption
Journal of Systems and Software
Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach
Journal of Automated Reasoning
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A restricted multi-show credential system and its application on e-voting
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A new key exchange protocol based on MQV assuming public computations
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Security implications in Kerberos by the introduction of smart cards
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pseudo-random functions exist.