Generic compilers for authenticated key exchange

22Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important application scenarios, key agreement and entity authentication are clearly separated protocols. This fact enables efficient attacks on the naïve combination of these protocols. In this paper, we propose new compilers for two-party key agreement and authentication, which are provably secure in the standard Bellare-Rogaway model. The constructions are generic: key agreement is executed first and results (without intervention of the adversary) in a secret session key on both sides. This key (or a derived key) is handed over, together with a transcript of all key exchange messages, to the authentication protocol, where it is combined with the random challenge(s) exchanged during authentication. © 2010 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2010). Generic compilers for authenticated key exchange. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6477 LNCS, pp. 232–249). Springer Verlag. https://doi.org/10.1007/978-3-642-17373-8_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free