Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
6-2005
Abstract
The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we build an efficient anonymous and authenticated key exchange protocol for roaming by using the modular approach under the CK-model. Our protocol requires only four message flows and uses only standard cryptographic primitives. We also propose a one-pass counter based MT-authenticator and show its security under the assumption that there exists a MAC which is secure against chosen message attack.
Keywords
Authenticated Key Exchange, Anonymous Roaming
Discipline
Information Security
Research Areas
Information Systems and Management
Publication
Applied Cryptography and Network Security: 3rd International Conference, ACNS 2005, New York, June 7-10: Proceedings
Volume
3531
First Page
334
Last Page
349
ISBN
9783540262237
Identifier
10.1007/11496137_23
Publisher
Springer
City or Country
Cham
Citation
YANG, Guomin; WONG, Duncan S.; and DENG, Xiaotie.
Efficient anonymous roaming and its security analysis. (2005). Applied Cryptography and Network Security: 3rd International Conference, ACNS 2005, New York, June 7-10: Proceedings. 3531, 334-349.
Available at: https://ink.library.smu.edu.sg/sis_research/7439
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/11496137_23