Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols. In this paper we revisit the definitions of this attribute and the method of proving this attribute under the Bellare-Rogaway (BR) model in the literature. We propose a new type of UKS attack, which coerces two entities A and B into sharing a key with each other but in fact A thinks that he is sharing the key with another entity C and B thinks that he is sharing the key with another entity D, where C and D might or might not be the same entity. We call this attack a Bilateral Unknown Key-Share (BUKS) attack. We demonstrate that a few well-known authenticated key agreement protocols are vulnerable to this attack. We then explore a gap b...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
So far, all solutions proposed for authenticated key agreement combine key agreement and authenticat...
Abstract. We show that the YAK protocol does not provide the joint key control attribute, and is vul...
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement prot...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
[[abstract]]The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), bu...
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
We observe that the definitions of security in the computational complexity proof models of Bellare ...
Abstract. Since Bellare and Rogaway’s work in 1994, the indistinguishability-based security models o...
Password-Authenticated Key Establishment (PAKE) protocols allow two parties, to share common secret ...
We study the problem of secure key establishment. We critically examine the security models of Bella...
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the...
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which ...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
So far, all solutions proposed for authenticated key agreement combine key agreement and authenticat...
Abstract. We show that the YAK protocol does not provide the joint key control attribute, and is vul...
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement prot...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
[[abstract]]The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), bu...
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
We observe that the definitions of security in the computational complexity proof models of Bellare ...
Abstract. Since Bellare and Rogaway’s work in 1994, the indistinguishability-based security models o...
Password-Authenticated Key Establishment (PAKE) protocols allow two parties, to share common secret ...
We study the problem of secure key establishment. We critically examine the security models of Bella...
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the...
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which ...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
So far, all solutions proposed for authenticated key agreement combine key agreement and authenticat...
Abstract. We show that the YAK protocol does not provide the joint key control attribute, and is vul...