Security model and modular design of fair authentication key exchange protocols

被引:0
作者
DengGuo Feng
WeiDong Chen
机构
[1] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Software
来源
Science China Information Sciences | 2010年 / 53卷
关键词
authentication key exchange protocols; deniability; fairness; concurrent signature; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such protocols be run under the circumstances where ones do not trust in each other. Therefore, in this paper we propose the idea of fair authentication key exchange (FAKE), which has not only the basic properties of AKE protocols, but also some new properties: the “session proof” embedded in the input of protocols by the customer; and if not revealed, the protocols have the deniability, otherwise the transcript of protocol is binding for the identifications. Such a method is capable of solving the contradiction between protecting privacy and the dissension on network service. Then the security model of FAKE protocols is formulated systematically and a flaw of the security model of current signature schemes proposed by Kudla is also corrected. Finally, a kind of FAKE protocol based on current signature schemes is designed and the mBJM-AK security, conditional deniability and fairness of FAKE protocols are proved in the random oracle model.
引用
收藏
页码:278 / 287
页数:9
相关论文
共 3 条
[1]  
Cham D.(1981)Untraceable electronic mail, return address and digital pseudonyms Commun ACM 24 84-88
[2]  
Chen W. D.(2005)Signature scheme for specified threshold verifiers and security proofs J Software 16 1967-1974
[3]  
Feng D. G.(undefined)undefined undefined undefined undefined-undefined