In our model, the adversary provides the initiator and the responder with the payload of their messages, which means our protocol can be used to implement securely any service based on authenticated message exchange. We even allow the adversary to read and reset the memory of the principals and to use, with very few restrictions, the private keys of the principals for signing the payloads or parts thereof. The latter corresponds to situations in which the keys are not only used by our protocol. We use timestamps to secure our protocol, but only assume that each principal has access to a local clock.
Category / Keywords: cryptographic protocols / authenticated message exchange, implementation, digital signatures Publication Info: ASIACCS 2010 Date: received 2 Jun 2009, last revised 11 Jan 2010 Contact author: kuertz at ti informatik uni-kiel de Available formats: PDF | BibTeX Citation Version: 20100111:142001 (All versions of this report) Discussion forum: Show discussion | Start new discussion