CIL Security Proof for a Password-Based Key Exchange

被引:0
作者
Ene, Cristian [1 ]
Gritti, Clementine [2 ]
Lakhnech, Yassine [1 ]
机构
[1] Univ Grenoble 1, CNRS, Verimag, France
[2] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013 | 2013年 / 8209卷
关键词
Password-Based Key Exchange; Logic; Security Proof;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational model. It is sound for standard model, but also supports reasoning in the random oracle and other idealized models. We illustrate the benefits of CIL by formally proving the security of a Password-Based Key Exchange (PBKE) scheme, which is designed to provide entities communicating over a public network and sharing a short password, under a session key.
引用
收藏
页码:59 / 85
页数:27
相关论文
共 16 条
  • [1] Persistent asymmetric password-based key exchange
    Jiang, Shaoquan
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2014, 8 (01) : 31 - 70
  • [2] Cryptanalysis and improvement of a password-based key exchange protocol
    Liu, Feng-Mei
    Luo, Shi-Xin
    Ren, Chuan-Lun
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3668 - +
  • [3] Round-Optimal Password-Based Authenticated Key Exchange
    Katz, Jonathan
    Vaikuntanathan, Vinod
    JOURNAL OF CRYPTOLOGY, 2013, 26 (04) : 714 - 743
  • [4] Password-Based Authenticated Key Exchange Based on Signcryption for the Internet of Things
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    2019 WIRELESS DAYS (WD), 2019,
  • [5] Round-Optimal Password-Based Authenticated Key Exchange
    Jonathan Katz
    Vinod Vaikuntanathan
    Journal of Cryptology, 2013, 26 : 714 - 743
  • [6] Efficient and Strongly Secure Password-Based Server Aided Key Exchange
    Yoneyama, Kazuki
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 172 - 184
  • [7] New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption
    Xue, Haiyang
    Li, Bao
    He, Jingnan
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 188 - 198
  • [8] Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme
    Kwon, JO
    Hwang, JY
    Kim, C
    Lee, DH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 858 - 865
  • [9] Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
    Catalano, Dario
    Pointcheval, David
    Pornin, Thomas
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 115 - 149
  • [10] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +