Publication Type

Conference Proceeding Article

Version

publishedVersion

Publication Date

6-2005

Abstract

The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we build an efficient anonymous and authenticated key exchange protocol for roaming by using the modular approach under the CK-model. Our protocol requires only four message flows and uses only standard cryptographic primitives. We also propose a one-pass counter based MT-authenticator and show its security under the assumption that there exists a MAC which is secure against chosen message attack.

Keywords

Authenticated Key Exchange, Anonymous Roaming

Discipline

Information Security

Research Areas

Information Systems and Management

Publication

Applied Cryptography and Network Security: 3rd International Conference, ACNS 2005, New York, June 7-10: Proceedings

Volume

3531

First Page

334

Last Page

349

ISBN

9783540262237

Identifier

10.1007/11496137_23

Publisher

Springer

City or Country

Cham

Additional URL

https://doi.org/10.1007/11496137_23

Share

COinS