Paper 2024/1215
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols
Abstract
A security proof for a key exchange protocol requires writing down a security definition. Authors typically have a clear idea of the level of security they aim to achieve, e.g., forward secrecy. Defining the model formally additionally requires making choices on games vs. simulation-based models, partnering, on having one or more Test queries and on adopting a style of avoiding trivial attacks: exclusion, penalizing or filtering. We elucidate the consequences, advantages and disadvantages of the different possible model choices. Concretely, we show that a model with multiple Test queries composes tightly with symmetric-key protocols while models with a single Test query require a hybrid argument that loses a factor in the number of sessions. To illustrate the usefulness of models with multiple Test queries, we prove the Naxos protocol security in said model and obtain a tighter bound than adding a hybrid argument on top of a proof in a single Test query model. Our composition model exposes partnering information to the adversary, circumventing a previous result by Brzuska, Fischlin, Warinschi, and Williams (CCS 2011) showing that the protocol needs to provide public partnering. Moreover, our baseline theorem of key exchange partnering shows that partnering by key equality provides a joint baseline for most known partnering mechanisms, countering previous criticism by Li and Schäge (CCS 2017) that security in models with existential quantification over session identifiers is non-falsifiable.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- key-exchange protocolsgame-based security modelspartnering
- Contact author(s)
-
chris brzuska @ aalto fi
cremers @ cispa de
hakon jacobsen @ its uio no
dstebila @ uwaterloo ca
csxbw @ bristol ac uk - History
- 2024-09-17: revised
- 2024-07-29: received
- See all versions
- Short URL
- https://ia.cr/2024/1215
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1215, author = {Chris Brzuska and Cas Cremers and Håkon Jacobsen and Douglas Stebila and Bogdan Warinschi}, title = {Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1215}, year = {2024}, url = {https://eprint.iacr.org/2024/1215} }