An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
Boyd, Colin A., Choo, Kim-Kwang Raymond, & Mathuria, Anish (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. Lecture Notes in Computer Science, 4058, pp. 371-382.
A security proof in the Bellare–Rogaway model and the random oracle model is provided for a protocol closely based on one originally proposed by Boyd (1996), which enjoys some remarkable efficiency properties. The model is extended so that it can detect a known weakness of the protocol that cannot be captured in the original model. An alternative protocol, provably secure in the extended model and the random oracle model, offering the same efficiency features as the original protocol is proposed. Moreover, our alternative protocol provides key confirmation and forward secrecy. It also allows session keys to be renewed in subsequent sessions without the server’s further involvement even in the event that the long-term key or the earlier session key have been compromised.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Journal Article|
|Additional Information:||11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006. Proceedings|
|Keywords:||Key Agreement Protocols, Bellare, Rogaway Model, Provable Security|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Software Engineering (080309)
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000)
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Past > QUT Faculties & Divisions > Faculty of Science and Technology
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2006 Springer|
|Copyright Statement:||“The final publication is available at link.springer.com".|
|Deposited On:||08 Jun 2006 00:00|
|Last Modified:||20 Aug 2013 05:41|
Repository Staff Only: item control page