Zero Round-Trip Time for the Extended Access Control Protocol
نویسندگان
چکیده
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that also the EAC protocol can be augmented to support a 0RTT mode. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting.
منابع مشابه
A New Digital Sense Multiple Access (DSMA) Protocol for High-Speed Wireless Networks
In this paper, we propose a new Digital Sense Multiple Access with Delayed Transmission (DSMA/DT) protocol for reverse channel in high-speed wireless networks. The new protocol is motivated by the observation that the existing DSMA protocol does not yield satisfactory throughput for long round-trip propagation and processing delay, which occurs in outdoor, high-speed environments or when the re...
متن کاملComparative Analysis of IEEE 802.1x Authentication Methods
The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...
متن کاملA Novel Medium Access Control Protocol for Routing Multimedia Traffic in Optical Networks by exploiting Delays with improved Dynamic Bandwidth Allocation
Traditional Medium Access control (MAC) Protocol achieves better performance for the traffic type actually they have been assigned for but inadequate for other traffic types. The prevailing multimedia applications need that the MAC protocol should execute all traffic types unvaryingly. To ensure efficient transmission, an optical network should make use of a MAC protocol to arbitrate access to ...
متن کاملDesign of SIP Transformation Server for Efficient Media Negotiation
Voice over IP (VoIP) is one of the advanced services supported by the next generation mobile communication. VoIP should support various media formats and terminals existing together. This heterogeneous environment may prevent diverse users from establishing VoIP sessions among them. To solve the problem an efficient media negotiation mechanism is required. In this paper, we propose the efficien...
متن کاملContention-Based Reservation Protocol for WDM Local Lightwave Networks with Nonuniform Traffic Pattern∗
This paper proposes a medium access control (MAC) protocol for single-hop WDM star-coupler networks, in which the number of stations is larger than the number of channels and the stations have arbitrary distances to the star coupler. The proposed protocol has one control channel for reserving the slots of data channels and several data channels which are used to transmit traffic. This paper als...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017