How to construct random functions
Journal of the ACM (JACM)
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
A probabilistic poly-time framework for protocol analysis
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Using encryption for authentication in large networks of computers
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fair Computation of General Functions in Presence of Immoral Majority
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
Proceedings of the 5th International Workshop on Security Protocols
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
SKEME: a versatile secure key exchange mechanism for Internet
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Universally Composable Notions of Key Exchange and Secure Channels
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A Provably Secure One-Pass Two-Party Key Establishment Protocol
Information Security and Cryptology
Deniable Authentication on the Internet
Information Security and Cryptology
Comparing the Pre- and Post-specified Peer Models for Key Agreement
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Efficient One-Round Key Exchange in the Standard Model
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Automated Device Pairing for Asymmetric Pairing Scenarios
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Leaky Random Oracle (Extended Abstract)
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A Modular Security Analysis of the TLS Handshake Protocol
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Framework for Authenticated Key Exchange in the Standard Model
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Key Insulation and Intrusion Resilience over a Public Channel
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
A New Strongly Secure Authenticated Key Exchange Protocol
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Towards Denial-of-Service-Resilient Key Agreement Protocols
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Strongly Secure Authenticated Key Exchange without NAXOS' Approach
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Fully Robust Tree-Diffie-Hellman Group Key Exchange
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Reusing Static Keys in Key Agreement Protocols
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
A secure and efficient SIP authentication scheme for converged VoIP networks
Computer Communications
Multi-factor password-authenticated key exchange
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Certificateless key agreement in the standard model
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
Proceedings of the 17th ACM conference on Computer and communications security
Taming big brother ambitions: more privacy for secret handshakes
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Modeling leakage of ephemeral secrets in tripartite/group key exchange
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
A new security model for authenticated key agreement
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A security enhancement and proof for authentication and key agreement (AKA)
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Authenticated key agreement with key re-use in the short authenticated strings model
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Degrees of security: protocol guarantees in the face of compromising adversaries
CSL'10/EACSL'10 Proceedings of the 24th international conference/19th annual conference on Computer science logic
Modeling and analyzing security in the presence of compromising adversaries
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Inductive trace properties for computational security
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Deniable internet key exchange
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Affiliation-hiding key exchange with untrusted group authorities
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Privacy-preserving group discovery with linear complexity
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Towards practical anonymous password authentication
Proceedings of the 26th Annual Computer Security Applications Conference
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
A secure and efficient authenticated Diffie-Hellman protocol
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
International Journal of Applied Cryptography
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
International Journal of Applied Cryptography
Security enhancement and modular treatment towards authenticated key exchange
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Strongly secure two-pass attribute-based authenticated key exchange
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Constructing certificateless encryption and ID-based encryption from ID-based key agreement
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Security analysis of the extended access control protocol for machine readable travel documents
ISC'10 Proceedings of the 13th international conference on Information security
Predicate-based authenticated key exchange resilient to ephemeral key leakage
WISA'10 Proceedings of the 11th international conference on Information security applications
Tamper detection marking for object files
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
One-pass HMQV and asymmetric key-wrapping
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Stronger security model of group key agreement
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Leakage resilient eCK-secure key exchange protocol without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
SAM: secure access of media independent information service with user anonymity
EURASIP Journal on Wireless Communications and Networking
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
Identity-based key exchange protocols without pairings
Transactions on computational science X
Analysis and improvement of an authenticated key exchange protocol
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Affiliation-hiding authentication with minimal bandwidth consumption
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
A generic variant of NIST's KAS2 key agreement protocol
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
E-MACs: towards more secure and more efficient constructions of secure channels
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Universally composable private proximity testing
ProvSec'11 Proceedings of the 5th international conference on Provable security
ProvSec'11 Proceedings of the 5th international conference on Provable security
TMQV: a strongly eCK-secure Diffie-Hellman protocol without gap assumption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Cryptanalysis of a SIP authentication scheme
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Composition theorems without pre-established session identifiers
Proceedings of the 18th ACM conference on Computer and communications security
Composability of bellare-rogaway key exchange protocols
Proceedings of the 18th ACM conference on Computer and communications security
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
Characterization of strongly secure authenticated key exchanges without NAXOS technique
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
A unified security framework for multi-domain wireless mesh networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Password based key exchange with mutual authentication
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Towards provably secure group key agreement building on group theory
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
On the importance of public-key validation in the MQV and HMQV key agreement protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Cryptographically sound implementations for communicating processes
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Examining indistinguishability-based proof models for key establishment protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Errors in computational complexity proofs for protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
On session key construction in provably-secure key establishment protocols
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
The security proof of a 4-way handshake protocol in IEEE 802.11i
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
On the resilience of key agreement protocols to key compromise impersonation
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Session corruption attack and improvements on encryption based MT-Authenticators
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Intrusion-Resilient secure channels
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Efficient anonymous roaming and its security analysis
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A universally composable secure channel based on the KEM-DEM framework
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Key-exchange protocol using pre-agreed Session-ID
WISA'04 Proceedings of the 5th international conference on Information Security Applications
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Ephemeral pairing on anonymous networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Design of secure key establishment protocols: successes, failures and prospects
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Security properties of two authenticated conference key agreement protocols
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
A deniable group key establishment protocol in the standard model
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
On robust key agreement based on public key authentication
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
About the security of MTI/C0 and MQV
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A new key exchange protocol based on MQV assuming public computations
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Security analysis of KEA authenticated key exchange protocol
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A framework for robust group key agreement
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Password based server aided key exchange
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
On the security of the authentication module of chinese WLAN standard implementation plan
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Efficient primitives from exponentiation in Zp
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Computational secrecy by typing for the pi calculus
APLAS'06 Proceedings of the 4th Asian conference on Programming Languages and Systems
A diffie-hellman key exchange protocol without random oracles
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Group secret handshakes or affiliation-hiding authenticated group key agreement
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Key exchange with anonymous authentication using DAA-SIGMA protocol
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Key exchange using passwords and long keys
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Intrusion-Resilience via the bounded-storage model
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Games and the impossibility of realizable ideal functionality
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Efficient authenticators with application to key exchange
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Tag size does matter: attacks and proofs for the TLS record protocol
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Authenticated key exchange under bad randomness
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Constructive cryptography --- a new paradigm for security definitions and proofs
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Analysis of the SSH key exchange protocol
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
On forward secrecy in one-round key exchange
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Comments on the SM2 key exchange protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Confidentiality and integrity: a constructive perspective
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
One-round identity-based key exchange with Perfect Forward Security
Information Processing Letters
Provably repairing the ISO/IEC 9798 standard for entity authentication
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Information Sciences: an International Journal
Securing wireless mesh networks in a unified security framework with corruption-resilience
Computer Networks: The International Journal of Computer and Telecommunications Networking
Strongly secure authenticated key exchange from factoring, codes, and lattices
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
A complementary analysis of the (s)YZ and DIKE protocols
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
SmartTokens: delegable access control with NFC-Enabled smartphones
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Strongly authenticated key exchange protocol from bilinear groups without random oracles
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Authenticated key exchange with entities from different settings and varied groups
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Sessions and separability in security protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Anonymity and one-way authentication in key exchange protocols
Designs, Codes and Cryptography
Provably secure certificateless one-way and two-party authenticated key agreement protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
An analysis of the EMV channel establishment protocol
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Exposure-resilient one-round tripartite key exchange without random oracles
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload
ACM Transactions on Internet Technology (TOIT)
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Journal of Medical Systems
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysing TLS in the strand spaces model
Journal of Computer Security
Shroud: ensuring private access to large-scale data in the data center
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Provably repairing the ISO/IEC 9798 standard for entity authentication
Journal of Computer Security - Security and Trust Principles
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as defined here); and (ii) the definition allows for simple modular proofs of security: one can design and prove security of key-exchange protocols in an idealized model where the communication links are perfectly authenticated, and then translate them using general tools to obtain security in the realistic setting of adversary-controlled links. We exemplify the usability of our results by applying them to obtain the proof of two classes of key-exchange protocols, Diffie-Hellman and key-transport, authenticated via symmetric or asymmetric techniques.