Security model and modular design of fair authentication key exchange protocols

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modular Fair Exchange Protocols for Electronic Commerce

Recently, research has focused on enabling fair exchange between payment and electronically shipped items. The reason for this is the growing importance of Electronic Commerce and the increasing number of applications in this area. Although a considerable number of fair exchange protocols exist, they usually have been defined for special scenarios and thus only work under particular assumptions...

متن کامل

Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a clientserver setting where only the server has a certified public key. The client is then authenticated by sending creden...

متن کامل

Design of Authentication and Key Management Protocols

Entity authentication and key management mechanisms using symmetric cryptographic algorithms are examined. The particular protocols of interest are currently being progressed through ISO/IEC standardisation procedures. We reveal a number of misconceptions seen in a series of the draft standards documents. Due to these misconceptions several protocols supplied in the standards proposals are foun...

متن کامل

Modular Security Proofs for Key Agreement Protocols

The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular approach to the construction of proofs of security for a large class of key agreement protocols. By following a modular approach to proof construction, we hope to enable simpler and less error-prone analysis and proof generation for such key agreement protocols. The t...

متن کامل

A Modular Framework for Multi-Factor Authentication and Key Exchange

Multi-Factor Authentication (MFA), often coupled with Key Exchange (KE), offers very strong protection for secure communication and has been recommended by many major governmental and industrial bodies for use in highly sensitive applications. Over the past few years many companies started to offer various MFA services to their users and this trend is ongoing. The MFAKE protocol framework prese...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2010

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-010-0033-9