In this paper we investigate the field of privacy-preserving authenticated key exchange protocols (PPAKE). First we make a cryptographic analysis of a previous PPAKE protocol. We show that most of its security properties, including privacy, are broken, despite the security proofs that are provided. Then we describe a strong security model which captures the security properties of a PPAKE: entity authentication, key indistinguishability, forward secrecy, and privacy. Finally, we present a PPAKE protocol in the symmetric-key setting which is suitable for constrained devices. We formally prove the security of this protocol in our model.
CITATION STYLE
Ferreira, L. (2022). Privacy-Preserving Authenticated Key Exchange for Constrained Devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13269 LNCS, pp. 293–312). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-09234-3_15
Mendeley helps you to discover research relevant for your work.