On session identifiers in provably secure protocols the Bellare-Rogaway three-party key distribution protocol revisited

23Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We examine the role of session identifiers (SIDs) in security proofs for key establishment protocols. After reviewing the practical importance of SIDs we use as a case study the three-party server-based key distribution (3PKD) protocol of Bellare and Rogaway, proven secure in 1995. We show incidentally that the partnership function used in the existing security proof is flawed. There seems to be no way to define a SID for the 3PKD protocol that will preserve the proof of security. A small change to the protocol allows a natural definition for a SID and we prove that the new protocol is secure using this SID to define partnering. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Choo, K. K. R., Boyd, C., Hitchcock, Y., & Maitland, G. (2005). On session identifiers in provably secure protocols the Bellare-Rogaway three-party key distribution protocol revisited. In Lecture Notes in Computer Science (Vol. 3352, pp. 351–366). Springer Verlag. https://doi.org/10.1007/978-3-540-30598-9_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free