Security model and modular design of fair authentication key exchange protocols
نویسندگان
چکیده
منابع مشابه
Modular Fair Exchange Protocols for Electronic Commerce
Recently, research has focused on enabling fair exchange between payment and electronically shipped items. The reason for this is the growing importance of Electronic Commerce and the increasing number of applications in this area. Although a considerable number of fair exchange protocols exist, they usually have been defined for special scenarios and thus only work under particular assumptions...
متن کاملKey Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a clientserver setting where only the server has a certified public key. The client is then authenticated by sending creden...
متن کاملDesign of Authentication and Key Management Protocols
Entity authentication and key management mechanisms using symmetric cryptographic algorithms are examined. The particular protocols of interest are currently being progressed through ISO/IEC standardisation procedures. We reveal a number of misconceptions seen in a series of the draft standards documents. Due to these misconceptions several protocols supplied in the standards proposals are foun...
متن کاملModular Security Proofs for Key Agreement Protocols
The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular approach to the construction of proofs of security for a large class of key agreement protocols. By following a modular approach to proof construction, we hope to enable simpler and less error-prone analysis and proof generation for such key agreement protocols. The t...
متن کاملA Modular Framework for Multi-Factor Authentication and Key Exchange
Multi-Factor Authentication (MFA), often coupled with Key Exchange (KE), offers very strong protection for secure communication and has been recommended by many major governmental and industrial bodies for use in highly sensitive applications. Over the past few years many companies started to offer various MFA services to their users and this trend is ongoing. The MFAKE protocol framework prese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science China Information Sciences
سال: 2010
ISSN: 1674-733X,1869-1919
DOI: 10.1007/s11432-010-0033-9