Zero Round-Trip Time for the Extended Access Control Protocol

نویسندگان

  • Jacqueline Brendel
  • Marc Fischlin
چکیده

The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that also the EAC protocol can be augmented to support a 0RTT mode. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Digital Sense Multiple Access (DSMA) Protocol for High-Speed Wireless Networks

In this paper, we propose a new Digital Sense Multiple Access with Delayed Transmission (DSMA/DT) protocol for reverse channel in high-speed wireless networks. The new protocol is motivated by the observation that the existing DSMA protocol does not yield satisfactory throughput for long round-trip propagation and processing delay, which occurs in outdoor, high-speed environments or when the re...

متن کامل

Comparative Analysis of IEEE 802.1x Authentication Methods

The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...

متن کامل

A Novel Medium Access Control Protocol for Routing Multimedia Traffic in Optical Networks by exploiting Delays with improved Dynamic Bandwidth Allocation

Traditional Medium Access control (MAC) Protocol achieves better performance for the traffic type actually they have been assigned for but inadequate for other traffic types. The prevailing multimedia applications need that the MAC protocol should execute all traffic types unvaryingly. To ensure efficient transmission, an optical network should make use of a MAC protocol to arbitrate access to ...

متن کامل

Design of SIP Transformation Server for Efficient Media Negotiation

Voice over IP (VoIP) is one of the advanced services supported by the next generation mobile communication. VoIP should support various media formats and terminals existing together. This heterogeneous environment may prevent diverse users from establishing VoIP sessions among them. To solve the problem an efficient media negotiation mechanism is required. In this paper, we propose the efficien...

متن کامل

Contention-Based Reservation Protocol for WDM Local Lightwave Networks with Nonuniform Traffic Pattern∗

This paper proposes a medium access control (MAC) protocol for single-hop WDM star-coupler networks, in which the number of stations is larger than the number of channels and the stations have arbitrary distances to the star coupler. The proposed protocol has one control channel for reserving the slots of data channels and several data channels which are used to transmit traffic. This paper als...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017