Universally composable notions of key exchange and secure channels

被引:0
作者
Canetti, R [1 ]
Krawczyk, H
机构
[1] IBM Corp, TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Technion Israel Inst Technol, EE Dept, Haifa, Israel
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS | 2002年 / 2332卷
关键词
key exchange; cryptographic protocols; proofs of security; composition of protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, Canetti and Krawczyk (Eurocrypt'2001) formulated a notion of security for key-exchange (KE) protocols, called SK-security, and showed that this notion suffices for constructing secure channels. However, their model and proofs do not suffice for proving more general composability properties of SK-secure KE protocols. We show that while the notion of SK-security is strictly weaker than a fully-idealized notion of key exchange security, it is sufficiently robust for providing secure composition with arbitrary protocols. In particular, SK-security guarantees the security of the key for any application that desires to set-up secret keys between pairs of parties. We also provide new definitions of secure-channels protocols with similarly strong composability properties, and show that SK-security suffices for obtaining these definitions. To obtain these results we use the recently proposed framework of "universally composable (UC) security." We also use a new tool, called "non-information oracles," which will probably find applications beyond the present case. These tools allow us to bridge between seemingly limited indistinguishability-based definitions such as SK-security and more powerful, simulation-based definitions, such as UC security, where general composition theorems can be proven. Furthermore, based on such composition theorems we reduce the analysis of a full-fledged multi-session key-exchange protocol to the (simpler) analysis of individual, stand-alone, key-exchange sessions.
引用
收藏
页码:337 / 351
页数:15
相关论文
共 24 条
[1]  
Beaver D., 1991, Journal of Cryptology, V4, P75, DOI 10.1007/BF00196771
[2]  
BELLARE M, 1993, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2_21
[3]  
BELLARE M, 1998, 30 STOC
[4]  
BELLARE M, 1995, ANN S THEOR COMP STO
[5]   SYSTEMATIC DESIGN OF A FAMILY OF ATTACK-RESISTANT AUTHENTICATION PROTOCOLS [J].
BIRD, R ;
GOPAL, I ;
HERZBERG, A ;
JANSON, PA ;
KUTTEN, S ;
MOLVA, R ;
YUNG, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :679-693
[6]  
Blake-Wilson S., 1997, P 6 IMA INT C CRYPT
[7]  
CANETTI R, 2000, J CRYPTOLOGY WIN
[8]  
Canetti R, 2002, UNIVERSAL COMPOSITIO
[9]  
CANETTI R, 2002, UNIVERSALLY COMPOSAB
[10]  
CANETTI R, 2001, EUROCRYPT 01