Reference : On the Relation Between SIM and IND-RoR Security Models for PAKEs |
Scientific congresses, symposiums and conference proceedings : Paper published in a book | |||
Engineering, computing & technology : Computer science | |||
Security, Reliability and Trust | |||
http://hdl.handle.net/10993/31655 | |||
On the Relation Between SIM and IND-RoR Security Models for PAKEs | |
English | |
Lopez Becerra, José Miguel ![]() | |
Iovino, Vincenzo ![]() | |
Ostrev, Dimiter ![]() | |
Skrobot, Marjan ![]() | |
2017 | |
Proceedings of the International Conference on Security and Cryptography | |
SCITEPRESS | |
12 | |
Yes | |
No | |
International | |
SECRYPT 2017 | |
from 24-07-2017 to 26-07-2017 | |
Madrid | |
Spain | |
[en] Password-based Authenticated Key-Exchange (PAKE) protocols allow users, who need only to share a password, to compute a high-entropy shared session key despite passwords being taken from a dictionary.
Security models for PAKE protocols aim to capture the desired security properties that such protocols must satisfy when executed in the presence of an active adversary. They are usually classified into i) indistinguishability-based (IND-based) or ii) simulation-based (SIM-based). The relation between these two security notions is unclear and mentioned as a gap in the literature. In this work, we prove that SIM-BMP security from Boyko et al.~(EUROCRYPT 2000) implies IND-RoR security from Abdalla et al.~(PKC 2005) and that IND-RoR security implies a slightly modified version of SIM-BMP security. We also investigate whether IND-RoR security implies (unmodified) SIM-BMP security. | |
Researchers | |
http://hdl.handle.net/10993/31655 | |
FnR ; FNR8293135 > Peter Y. A. Ryan > AToMS > A Theory of Matching Sessions > 01/05/2015 > 30/04/2018 > 2014; FNR11299247 > Vincenzo Iovino > FESS > Functional Encrypted Secure Systems > 01/12/2016 > 30/11/2019 > 2016 |
File(s) associated to this reference | ||||||||||||||
Fulltext file(s):
| ||||||||||||||
All documents in ORBilu are protected by a user license.