Efficient anonymous roaming and its security analysis

The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, WONG, Duncan S., DENG, Xiaotie
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2005
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7439
https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8442
record_format dspace
spelling sg-smu-ink.sis_research-84422023-08-21T07:03:40Z Efficient anonymous roaming and its security analysis YANG, Guomin WONG, Duncan S. DENG, Xiaotie The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we build an efficient anonymous and authenticated key exchange protocol for roaming by using the modular approach under the CK-model. Our protocol requires only four message flows and uses only standard cryptographic primitives. We also propose a one-pass counter based MT-authenticator and show its security under the assumption that there exists a MAC which is secure against chosen message attack. 2005-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7439 info:doi/10.1007/11496137_23 https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated Key Exchange Anonymous Roaming Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Authenticated Key Exchange
Anonymous Roaming
Information Security
spellingShingle Authenticated Key Exchange
Anonymous Roaming
Information Security
YANG, Guomin
WONG, Duncan S.
DENG, Xiaotie
Efficient anonymous roaming and its security analysis
description The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we build an efficient anonymous and authenticated key exchange protocol for roaming by using the modular approach under the CK-model. Our protocol requires only four message flows and uses only standard cryptographic primitives. We also propose a one-pass counter based MT-authenticator and show its security under the assumption that there exists a MAC which is secure against chosen message attack.
format text
author YANG, Guomin
WONG, Duncan S.
DENG, Xiaotie
author_facet YANG, Guomin
WONG, Duncan S.
DENG, Xiaotie
author_sort YANG, Guomin
title Efficient anonymous roaming and its security analysis
title_short Efficient anonymous roaming and its security analysis
title_full Efficient anonymous roaming and its security analysis
title_fullStr Efficient anonymous roaming and its security analysis
title_full_unstemmed Efficient anonymous roaming and its security analysis
title_sort efficient anonymous roaming and its security analysis
publisher Institutional Knowledge at Singapore Management University
publishDate 2005
url https://ink.library.smu.edu.sg/sis_research/7439
https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf
_version_ 1779156952793743360