DocumentCode :
2094288
Title :
Paradox Stems from the Security Model or the Security Proof?
Author :
Pu, Qiong ; Ding, Jianmin
Author_Institution :
Dept. of Electron., Inf. Eng. Univ., Zhengzhou, China
Volume :
1
fYear :
2008
fDate :
20-22 Dec. 2008
Firstpage :
682
Lastpage :
685
Abstract :
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness of the security model. We defuse it by demonstrating that the attack can be captured in the BPR2000 model. Furthermore, we argue that the paradox is due to the flaws in the proof of security.
Keywords :
authorisation; cryptographic protocols; BPR2000 model; security model; security proof; three-party password-authenticated key exchange protocol; Arithmetic; Authentication; Computer science; Computer security; Costs; Cryptographic protocols; Cryptography; Information security; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Computational Technology, 2008. ISCSCT '08. International Symposium on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-3746-7
Type :
conf
DOI :
10.1109/ISCSCT.2008.54
Filename :
4731518
Link To Document :
بازگشت