Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/4773
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Minkyu | - |
dc.contributor.author | Fujioka, Atsushi | - |
dc.contributor.author | Ustaoğlu, Berkant | - |
dc.date.accessioned | 2017-02-01T10:56:20Z | - |
dc.date.available | 2017-02-01T10:56:20Z | - |
dc.date.issued | 2009 | - |
dc.identifier.citation | Kim, M., Fujioka, A., and Ustaoğlu, B. (2009). Strongly secure authenticated key exchange without NAXOS' approach. Lecture Notes in Computer Science, 5824 LNCS, 174-191. doi:10.1007/978-3-642-04846-3_12 | en_US |
dc.identifier.isbn | 9783642048456 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.issn | 1611-3349 | - |
dc.identifier.uri | http://doi.org/10.1007/978-3-642-04846-3_12 | - |
dc.identifier.uri | http://hdl.handle.net/11147/4773 | - |
dc.description | 4th International Workshop on Security, IWSEC 2009; Toyama; Japan; 28 October 2009 through 30 October 2009 | en_US |
dc.description.abstract | LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X; more precisely X∈=∈g H(x,a). As a result, no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. In other words, the discrete logarithm of an ephemeral public key, which is typically the ephemeral secret, is hidden via an additional random oracle. In this paper, we show that it is possible to construct eCK-secure protocol without the NAXOS' approach by proposing two eCK-secure protocols. One is secure under the GDH assumption and the other under the CDH assumption; their efficiency and security assurances are comparable to the well-known HMQV [12] protocol. Furthermore, they are at least as secure as protocols that use the NAXOS' approach but unlike them and HMQV, the use of the random oracle is minimized and restricted to the key derivation function. © 2009 Springer-Verlag Berlin Heidelberg. | en_US |
dc.language.iso | tr | en_US |
dc.publisher | Springer Verlag | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Network protocols | en_US |
dc.subject | Authenticated key exchange | en_US |
dc.subject | NAXOS' approach | en_US |
dc.subject | Trapdoor test | en_US |
dc.subject | eCK model | en_US |
dc.title | Strongly secure authenticated key exchange without NAXOS' approach | en_US |
dc.type | Conference Object | en_US |
dc.authorid | TR102756 | en_US |
dc.institutionauthor | Kim, Minkyu | - |
dc.institutionauthor | Fujioka, Atsushi | - |
dc.institutionauthor | Ustaoğlu, Berkant | - |
dc.department | İzmir Institute of Technology. Mathematics | en_US |
dc.identifier.volume | 5824 LNCS | en_US |
dc.identifier.startpage | 174 | en_US |
dc.identifier.endpage | 191 | en_US |
dc.identifier.wos | WOS:000273606100011 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1007/978-3-642-04846-3_12 | - |
dc.relation.doi | 10.1007/978-3-642-04846-3_12 | en_US |
dc.coverage.doi | 10.1007/978-3-642-04846-3_12 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | Q3 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | tr | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
crisitem.author.dept | 04.02. Department of Mathematics | - |
Appears in Collections: | Mathematics / Matematik Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
36
checked on Nov 29, 2024
WEB OF SCIENCETM
Citations
27
checked on Nov 23, 2024
Page view(s)
226
checked on Dec 2, 2024
Download(s)
238
checked on Dec 2, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.