Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal

52Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We show that it is possible to achieve perfect forward secrecy in two-message key exchange (KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk (eCK) security model. In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal the long-term secret keys of the actor of a session and reveal ephemeral secret keys. We propose two new game-based security models for KE protocols. First, we formalize a slightly stronger variant of the eCK security model that we call eCK w. Second, we integrate perfect forward secrecy into eCK w, which gives rise to the even stronger eCK-PFS model. We propose a security-strengthening transformation (i.e., a compiler) between our new models. Given a two-message Diffie-Hellman type protocol secure in eCK w, our transformation yields a two-message protocol that is secure in eCK-PFS. As an example, we show how our transformation can be applied to the NAXOS protocol. © 2012 Springer-Verlag.

References Powered by Scopus

Analysis of Key-Exchange protocols and their use for building secure channels

1312Citations
N/AReaders
Get full text

Authenticated key exchange secure against dictionary attacks

1204Citations
N/AReaders
Get full text

Entity authentication and key distribution

1121Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Authenticated key exchange from ideal lattices

144Citations
N/AReaders
Get full text

On ends-to-ends encryption asynchronous group messaging with strong security guarantees

92Citations
N/AReaders
Get full text

0-RTT key exchange with full forward secrecy

68Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Cremers, C., & Feltz, M. (2012). Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 734–751). https://doi.org/10.1007/978-3-642-33167-1_42

Readers over time

‘15‘16‘17‘18‘19‘20‘21‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 12

67%

Researcher 3

17%

Professor / Associate Prof. 2

11%

Lecturer / Post doc 1

6%

Readers' Discipline

Tooltip

Computer Science 14

82%

Physics and Astronomy 1

6%

Mathematics 1

6%

Engineering 1

6%

Save time finding and organizing research with Mendeley

Sign up for free
0