Cryptology ePrint Archive: Report 2005/129
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
Zhaohui Cheng and Manos Nistazakis and Richard Comley and Luminita Vasiu
Abstract: Since Bellare and Rogway's work , the indistinguishability-based security models of authenticated key agreement protocols in simple cases have been evolving for ten years. In this report, we review and organize the models under a unified framework with some new extensions. By providing a new ability (the Coin query) to adversaries and redefining two key security notions, the framework fully exploits an adversary's capability and can be used to prove all the commonly required security attributes of key agreement protocols with key confirmation. At the same time, the Coin query is also used to define a model which can be used to heuristically evaluate the security of a large category of authenticated protocols without key confirmation. We use the models to analyze a few pairing-based authenticated key agreement protocols.
Category / Keywords: cryptographic protocols / key agreement formulation model, pairing-based key agreement
Publication Info: Extended abstract appeared on ACNS 2004
Date: received 30 Apr 2005, last revised 27 May 2005
Contact author: m z cheng at mdx ac uk
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Note: The problem addressed in the work happened in other publications. Hence the paper is posted here for wider access. The update correct a few typos.
Version: 20050527:144806 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]