Efficient anonymous roaming and its security analysis
The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7439 https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8442 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84422023-08-21T07:03:40Z Efficient anonymous roaming and its security analysis YANG, Guomin WONG, Duncan S. DENG, Xiaotie The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we build an efficient anonymous and authenticated key exchange protocol for roaming by using the modular approach under the CK-model. Our protocol requires only four message flows and uses only standard cryptographic primitives. We also propose a one-pass counter based MT-authenticator and show its security under the assumption that there exists a MAC which is secure against chosen message attack. 2005-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7439 info:doi/10.1007/11496137_23 https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated Key Exchange Anonymous Roaming Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Authenticated Key Exchange Anonymous Roaming Information Security |
spellingShingle |
Authenticated Key Exchange Anonymous Roaming Information Security YANG, Guomin WONG, Duncan S. DENG, Xiaotie Efficient anonymous roaming and its security analysis |
description |
The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we build an efficient anonymous and authenticated key exchange protocol for roaming by using the modular approach under the CK-model. Our protocol requires only four message flows and uses only standard cryptographic primitives. We also propose a one-pass counter based MT-authenticator and show its security under the assumption that there exists a MAC which is secure against chosen message attack. |
format |
text |
author |
YANG, Guomin WONG, Duncan S. DENG, Xiaotie |
author_facet |
YANG, Guomin WONG, Duncan S. DENG, Xiaotie |
author_sort |
YANG, Guomin |
title |
Efficient anonymous roaming and its security analysis |
title_short |
Efficient anonymous roaming and its security analysis |
title_full |
Efficient anonymous roaming and its security analysis |
title_fullStr |
Efficient anonymous roaming and its security analysis |
title_full_unstemmed |
Efficient anonymous roaming and its security analysis |
title_sort |
efficient anonymous roaming and its security analysis |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2005 |
url |
https://ink.library.smu.edu.sg/sis_research/7439 https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf |
_version_ |
1779156952793743360 |