Please use this identifier to cite or link to this item: https://doi.org/10.1007/978-3-642-27576-0_10
DC FieldValue
dc.titleAuthenticated key exchange under bad randomness
dc.contributor.authorYang, G.
dc.contributor.authorDuan, S.
dc.contributor.authorWong, D.S.
dc.contributor.authorTan, C.H.
dc.contributor.authorWang, H.
dc.date.accessioned2014-12-12T07:53:01Z
dc.date.available2014-12-12T07:53:01Z
dc.date.issued2012
dc.identifier.citationYang, G.,Duan, S.,Wong, D.S.,Tan, C.H.,Wang, H. (2012). Authenticated key exchange under bad randomness. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7035 LNCS : 113-126. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-27576-0_10" target="_blank">https://doi.org/10.1007/978-3-642-27576-0_10</a>
dc.identifier.isbn9783642275753
dc.identifier.issn03029743
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/116695
dc.description.abstractWe initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks. We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomness situations respectively, and investigate the security of some widely used AKE protocols in these models by showing that they become insecure when the adversary is able to manipulate the randomness. On the positive side, we propose simple but generic methods to make AKE protocols secure in Reset-1 and Reset-2 models. The methods work in a modular way: first, we strengthen a widely used AKE protocol to achieve Reset-2 security, then we show how to transform any Reset-2 secure AKE protocol to a new one which also satisfies Reset-1 security. © 2012 Springer-Verlag.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-27576-0_10
dc.sourceScopus
dc.subjectAuthenticated Key Exchange
dc.subjectBad Randomness
dc.subjectResettable Cryptography
dc.typeConference Paper
dc.contributor.departmentTEMASEK LABORATORIES
dc.description.doi10.1007/978-3-642-27576-0_10
dc.description.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.description.volume7035 LNCS
dc.description.page113-126
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.