ASICS: authenticated key exchange security incorporating certification systems

被引:2
作者
Boyd, Colin [1 ]
Cremers, Cas [2 ]
Feltz, Michele [3 ]
Paterson, Kenneth G. [4 ]
Poettering, Bertram [5 ]
Stebila, Douglas [6 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
[2] Univ Oxford, Oxford, England
[3] Natl Commiss Data Protect, Esch Sur Alzette, Luxembourg
[4] Royal Holloway Univ London, Egham, Surrey, England
[5] Ruhr Univ Bochum, Bochum, Germany
[6] Queensland Univ Technol, Brisbane, Qld, Australia
基金
英国工程与自然科学研究理事会; 澳大利亚研究理事会;
关键词
Authenticated key exchange (AKE); Unknown key share (UKS) attacks; Certification authority (CA); Invalid public keys; PKI; SIGNATURES; PROTOCOLS; HMQV;
D O I
10.1007/s10207-015-0312-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems. We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family, we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
引用
收藏
页码:151 / 171
页数:21
相关论文
共 46 条
[1]  
[Anonymous], 2011, ASIACCS
[2]  
[Anonymous], 2007, NIST SPECIAL PUBLICA
[3]  
[Anonymous], 2013, CA BROWSER FORUM GUI
[4]  
[Anonymous], 2005, Tech. Rep. RFC 4210
[5]  
[Anonymous], 2013, CA BROWSER FORUM BAS
[6]  
[Anonymous], 2005, 2005176 CRYPT EPRINT
[7]  
[Anonymous], 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180453
[8]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[9]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[10]  
Bellare M., 1994, CRYPTO, P232