Credential authenticated identification and key exchange

21Citations
Citations of this article
60Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper initiates a study of two-party identification and key-exchange protocols in which users authenticate themselves by proving possession of credentials satisfying arbitrary policies, instead of using the more traditional mechanism of a public-key infrastructure. Definitions in the universal composability framework are given, and practical protocols satisfying these definitions, for policies of practical interest, are presented. All protocols are analyzed in the common reference string model, assuming adaptive corruptions with erasures, and no random oracles. The new security notion includes password-authenticated key exchange as a special case, and new, practical protocols for this problem are presented as well, including the first such protocol that provides resilience against server compromise (without random oracles). © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Camenisch, J., Casati, N., Gross, T., & Shoup, V. (2010). Credential authenticated identification and key exchange. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6223 LNCS, pp. 255–276). https://doi.org/10.1007/978-3-642-14623-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free