skip to main content
10.1145/276698.276854acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)

Authors Info & Claims
Published:23 May 1998Publication History
First page image

References

  1. Bea.D. BEAVER, "Foundations of Secure Interactive Computing'', CRYPTO '91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BCK.1%I. BELLARE, R. CANETTI AND H. KaAWCZYK, "A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols", Available at http://w,r~-cse.uc~d.edu/users/mihir and at the Theow of Cryptography Libra.,5; http://theory.lcs.mit.edu/'tcryptol, March 1998.Google ScholarGoogle Scholar
  3. BPRR.1%I. BELLARE, E. PETIL~NK, C. RACKOFF AND P. ROG- AV,'AY, "Authenticated key exchange in the public key model," 1995-96.Google ScholarGoogle Scholar
  4. BR1.1%I. BELLArm ANn P. ROOAWAY, "Entity authentication and key distribution", CRYPTO '93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BR2.M. BELLARE AND P. ROGAWAY, "Provably secure session key distribution- the three party case," Prec. of the 27th ACM STOC, ACM, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BlMe.S. BLXKE-WmSON AND A. MENEZES, "Entity authentication and authenticated key transport protocols employing asymmetric techniques", Proceedings of the 1997 Security Protocols ~Ibrkshop, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. BJM.S. BLAKE-WILSON, D. JOHNSON AND A. MENEZES, "Key exchange protocols and their security analysis," Proceedings of the sixth IMA International Conference on Cryptography and Coding, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BCG.M. BEN-OR, R. CANETTI AND O. GOLDREICH, "Asynchronous Secure Computations", Prec. of the 25th ACM STOC, ACM, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. BGW.M. BEN-OR, S. GOLD%VXSSER, AND A. WIODEaSON, Completeness theorems for non-cryptographic faulttolerant distributed computations, Prec. of the 20th ACM STOC, ACM, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. BGH+.R. Bin. D, I. Goem., A. H~.RZnERO, P. JANSEN, S. KUT- TEN, R. MOLVA Arid M. YVNC, "Systematic design of two-party authentication protocols," CRYPTO '91.Google ScholarGoogle Scholar
  11. BAN.1%I. Bv~mows, 1%1. ABADI AND R. N~.EDHAM, "A logic for authentication," DEC Systems Research Center Technical Report 39, February 1990. Earlier versions in Proceedings of the Second Conference on Theoreticzl Aspects of Reasoning about Knowledge, 1988, and Proceedings of the Twelfth ACM Symposium on Operating Systems Principles, 1989.Google ScholarGoogle Scholar
  12. Ca1.R. CANr. T'n, "Modular Composition of Secure Multiparty Protocols", Ax~ilable at the Theory of Cryptography Librars; http://theory.lcs.mi~.edu/ tcryptol, 1998.Google ScholarGoogle Scholar
  13. Ca2.R. CANETTI, "Towards realizing random oracles: Hash functions that hide all partial information", CR~fPTO '97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. CFGN.R. CANETTI, U. FEIOE, O. GOLDnEWH AND 1%~. NAOn, "Adaptively Secure Computation", Prec. of the 28th ACM STOC, ACM, 1996. Fuller version MIT-LCS-TR #682, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. CCD.D. CHAUM, C. CRI~PEAU, AND I. DAMGARD, "Multiparty unconditionally secure protocols", Prec. of the 20th ACM STOC, ACM, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. DH.W. Dmrm AND M. HELLMAN, "New directions in cryptography,'' iEEE Trans. Into. Theo,y iT-22, November 1976, pp. 644-654.Google ScholarGoogle Scholar
  17. DOW.W. DIFFm, P. VAN OORSCHOT AND M. WmN~a, "Authentication and authenticated key exchange?, Designs, Codes and Cryptography, 2, 1992, pp. 107-125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. DDN.D. DOLP. V, C. DWORK AND M. NAon, "Non-malleable cryptography", TR CS95-27, Weizmann Institute. Preliminary version in Prec. of the 23rd ACM STOC, ACM, 1991.Google ScholarGoogle Scholar
  19. GMW.O. GOLDP~ICH, $. MICALI AND A. WmDEnSOr~, "How to play any mental game, or A completeness theorem for protocols with honest majority," Prec. o~ the 19th ACM STOC, ACM, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. GMR.S. COLDWASSEIt, $. h'IIOALI AND R. RIVEST, "A digital signature scheme secure against adaptive chosenmessage attacks," SIAM Journal of Computing, Vol. 17, No. 2, April 1988, pp. 281-308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. ISO.ISO/IEC IS 9798-3, "Entity authentication mcchanism~ --- Part 3: Entity authentication using asymmetric techniques'', 1993.Google ScholarGoogle Scholar
  22. HC.D. HARKINS AND D. CArmEL, ed., "The resolution of ISAKMP with Oakle)%" lnternet draft, draft-ietf-ipsec-isakmp-oakley-05.txt, Nov. 1997.Google ScholarGoogle Scholar
  23. Kra.H. KRAWOZYK, "SKEME: A Versatile Secure Key Exchange Mechanism for Internet,", Proceedings of the 1996 Internet Society Symposium on Network and Distributed System Securit~ Feb. 1996, pp. 114-127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Luc.S. LUCKS, "Open key exchange: How to defeat dictionary attacks without encrypting public keys," Proceedings of the 1997 Security Protocols tVorl.'shop, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. MVV.A. MENEZES, P. VAN OORSCHOT AND S. VANSTONE, "Handbook of Applied Cryptography," CRC PresJ, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. MR.S. MIOALI AND P. ROGAWAY, "Secure Computation", Manuscript, 1992. Preliminary version in CRYPTO '91.Google ScholarGoogle Scholar
  27. NR.M. Nxoa AND O. R~IN(~OLD, "Efficient cryptographlc primitives based on the decisional Diffie-He!lman assumption'', Prec. of the 38th IEEE FOCS, IEEE, 1997.Google ScholarGoogle Scholar
  28. NY.M. NAOR AND M. YUNO, "Public key cryptosystem~ provably secure against chosen ciphertext attacks", Prec. of the 22nd ACM STOC, ACM, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. NS.R. NEEDHAM AND M. SOHROEDER, "Using encryption for authentication in large networks of computers," Communications of the ACM, Vol. 21, No. 12, December 1978, pp. 993-999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ra.C. RAOKOFF, "Some definitions, protocols and proofo about secure authentication," IBM CASCON 92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. SR.V. SHOUP AND A. RUmN. Session key distribution using smart cards. EUROCRYPT '96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. RS.C. RACKOFr AND D. SIMON, "Non-interactive zeroknowledge proof of knmvledge and chosen ciphertext attack", CRYPTO '91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. SNS.J. STErnER, C. NEWMAN AND J. SCmLr. Ert, "Kerbero:t: an authentication service for open network systems," Proceedings of the USENIX Winter Conferenco, 1988, pp. 191-202.Google ScholarGoogle Scholar
  34. Y.A. YAO, Protocols for Secure Computation, In Prec, 23th Annual Syrup. on Foundations of Computer Sci. once, pages 160-164. IEEE, 1982.Google ScholarGoogle Scholar

Index Terms

  1. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing
      May 1998
      684 pages
      ISBN:0897919629
      DOI:10.1145/276698

      Copyright © 1998 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 May 1998

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      STOC '98 Paper Acceptance Rate75of169submissions,44%Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader