We propose two new game-based security models for KE protocols. First, we formalize a slightly stronger variant of the eCK security model that we call eCKw. Second, we integrate perfect forward secrecy into eCKw, which gives rise to the even stronger eCK-PFS model. We propose a security-strengthening transformation (i.e., a compiler) between our new models. Given a two-message Diffie-Hellman type protocol secure in eCKw, our transformation yields a two-message protocol that is secure in eCK-PFS. As an example, we show how our transformation can be applied to the NAXOS protocol.
Category / Keywords: cryptographic protocols / key exchange, security models, protocol transformations, perfect forward secrecy, ephemeral-key reveal, key compromise impersonation, actor compromise Publication Info: Full version of the ESORICS 2012 paper Date: received 25 Jul 2012 Contact author: feltzm at inf ethz ch Available format(s): PDF | BibTeX Citation Version: 20120801:040430 (All versions of this report) Short URL: ia.cr/2012/416 Discussion forum: Show discussion | Start new discussion