Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-27576-0_10
DC Field | Value | |
---|---|---|
dc.title | Authenticated key exchange under bad randomness | |
dc.contributor.author | Yang, G. | |
dc.contributor.author | Duan, S. | |
dc.contributor.author | Wong, D.S. | |
dc.contributor.author | Tan, C.H. | |
dc.contributor.author | Wang, H. | |
dc.date.accessioned | 2014-12-12T07:53:01Z | |
dc.date.available | 2014-12-12T07:53:01Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Yang, G.,Duan, S.,Wong, D.S.,Tan, C.H.,Wang, H. (2012). Authenticated key exchange under bad randomness. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7035 LNCS : 113-126. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-27576-0_10" target="_blank">https://doi.org/10.1007/978-3-642-27576-0_10</a> | |
dc.identifier.isbn | 9783642275753 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/116695 | |
dc.description.abstract | We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks. We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomness situations respectively, and investigate the security of some widely used AKE protocols in these models by showing that they become insecure when the adversary is able to manipulate the randomness. On the positive side, we propose simple but generic methods to make AKE protocols secure in Reset-1 and Reset-2 models. The methods work in a modular way: first, we strengthen a widely used AKE protocol to achieve Reset-2 security, then we show how to transform any Reset-2 secure AKE protocol to a new one which also satisfies Reset-1 security. © 2012 Springer-Verlag. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-27576-0_10 | |
dc.source | Scopus | |
dc.subject | Authenticated Key Exchange | |
dc.subject | Bad Randomness | |
dc.subject | Resettable Cryptography | |
dc.type | Conference Paper | |
dc.contributor.department | TEMASEK LABORATORIES | |
dc.description.doi | 10.1007/978-3-642-27576-0_10 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 7035 LNCS | |
dc.description.page | 113-126 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.