An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
Boyd, Colin A., Choo, Kim-Kwang R., & Mathuria, Anish (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. In Batten, L. & Safavi-Naini, R. (Eds.) 11th Australasian Conference. on. Information Security and Privacy - ACISP 2006, 3 - 5 July 2006, Melbourne, Australia.
A security proof in the Bellare–Rogaway model and the random oracle model is provided for a protocol closely based on one originally proposed by Boyd (1996), which enjoys some remarkable efficiency properties. The model is extended so that it can detect a known weakness of the protocol that cannot be captured in the original model. An alternative protocol, provably secure in the extended model and the random oracle model, offering the same efficiency features as the original protocol is proposed. Moreover, our alternative protocol provides key confirmation and forward secrecy. It also allows session keys to be renewed in subsequent sessions without the server’s further involvement even in the event that the long-term key or the earlier session key have
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||Key Agreement Protocols, Bellare, Rogaway Model, Provable Security|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Software Engineering (080309)|
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000)
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
|Copyright Owner:||Copyright 2006 Springer|
|Copyright Statement:||This is the author-version of the work. Conference proceedings published, by Springer Verlag, will be available via SpringerLink. http://www.springer.de/comp/lncs/ Lecture Notes in Computer Science|
|Deposited On:||08 Jun 2006|
|Last Modified:||29 Feb 2012 23:18|
Repository Staff Only: item control page