QUT ePrints

An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys

Boyd, Colin A., Choo, Kim-Kwang Raymond, & Mathuria, Anish (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. Lecture Notes in Computer Science, 4058, pp. 371-382.

View at publisher

Abstract

A security proof in the Bellare–Rogaway model and the random oracle model is provided for a protocol closely based on one originally proposed by Boyd (1996), which enjoys some remarkable efficiency properties. The model is extended so that it can detect a known weakness of the protocol that cannot be captured in the original model. An alternative protocol, provably secure in the extended model and the random oracle model, offering the same efficiency features as the original protocol is proposed. Moreover, our alternative protocol provides key confirmation and forward secrecy. It also allows session keys to be renewed in subsequent sessions without the server’s further involvement even in the event that the long-term key or the earlier session key have been compromised.

Impact and interest:

2 citations in Scopus
Search Google Scholar™
4 citations in Web of Science®

Citation countsare sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

317 since deposited on 08 Jun 2006
48 in the past twelve months

Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 4421
Item Type: Journal Article
Additional Information: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings
Keywords: Key Agreement Protocols, Bellare, Rogaway Model, Provable Security
DOI: 10.1007/11780656_31
ISBN: 3540354581
ISSN: 1611-3349
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Software Engineering (080309)
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000)
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Past > QUT Faculties & Divisions > Faculty of Science and Technology
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2006 Springer
Copyright Statement: “The final publication is available at link.springer.com".
Deposited On: 08 Jun 2006
Last Modified: 20 Aug 2013 15:41

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page