Deniable authenticated key establishment for internet protocols

  • Authors:
  • Colin Boyd;Wenbo Mao;Kenneth G. Paterson

  • Affiliations:
  • Information Security Research Centre, Queensland University of Technology, Brisbane, Australia;Hewlett-Packard Laboratories, Bristol, UK;Information Security Group, Royal Holloway, University of London, Egham, Surrey, UK

  • Venue:
  • Proceedings of the 11th international conference on Security Protocols
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.