Examining indistinguishability-based proof models for key establishment protocols

N/ACitations
Citations of this article
55Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We examine various indistinguishability-based proof models for key establishment protocols, namely the Bellare & Rogaway (1993, 1995), the Bellare, Pointcheval, & Rogaway (2000), and the Canetti & Krawczyk (2001) proof models. We then consider several variants of these proof models, identify several subtle differences between these variants and models, and compare the relative strengths of the notions of security between the models. For each of the pair of relations between the models (either an implication or a non-implication), we provide proofs or counter-examples to support the observed relations. We also reveal a drawback with the original formulation of the Bellare, Pointcheval, & Rogaway (2000) model, whereby the Corrupt query is not allowed. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Choo, K. K. R., Boyd, C., & Hitchcock, Y. (2005). Examining indistinguishability-based proof models for key establishment protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3788 LNCS, pp. 585–604). https://doi.org/10.1007/11593447_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free