Paper 2024/1215

Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols

Chris Brzuska, Aalto University
Cas Cremers, Helmholtz Center for Information Security
Håkon Jacobsen, University of Oslo
Douglas Stebila, University of Waterloo
Bogdan Warinschi, University of Bristol, DFINITY
Abstract

A security proof for a key exchange protocol requires writing down a security definition. Authors typically have a clear idea of the level of security they aim to achieve. Defining the model formally additionally requires making choices on games vs. simulation-based models, partnering, on having one or more Test queries and on adopting a style of avoiding trivial attacks: exclusion, penalizing or filtering. We elucidate the consequences, advantages and disadvantages of the different possible model choices. Concretely, we show that a model with multiple Test queries composes tightly with symmetric-key protocols while models with a single Test query require a hybrid argument that loses a factor in the number of sessions. To illustrate the usefulness of models with multiple Test queries, we prove the Naxos protocol security in said model and obtain a tighter bound than adding a hybrid argument on top of a proof in a single Test query model. Our composition model exposes partnering information to the adversary, circumventing a previous result by Brzuska, Fischlin, Warinschi, and Williams (CCS 2011) showing that the protocol needs to provide public partnering. Moreover, our baseline theorem of key exchange partnering shows that partnering by key equality provides a joint baseline for most known partnering mechanisms, countering previous criticism by Li and Schäge (CCS 2017) that security in models with existential quantification over session identifiers is non-falsifiable.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
key-exchange protocolsgame-based security modelspartnering
Contact author(s)
chris brzuska @ aalto fi
cremers @ cispa de
hakon jacobsen @ its uio no
dstebila @ uwaterloo ca
csxbw @ bristol ac uk
History
2024-07-31: approved
2024-07-29: received
See all versions
Short URL
https://ia.cr/2024/1215
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1215,
      author = {Chris Brzuska and Cas Cremers and Håkon Jacobsen and Douglas Stebila and Bogdan Warinschi},
      title = {Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2024/1215},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/1215}},
      url = {https://eprint.iacr.org/2024/1215}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.