Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/4770
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Menezes, Alfred | - |
dc.contributor.author | Ustaoğlu, Berkant | - |
dc.date.accessioned | 2017-02-01T08:26:21Z | - |
dc.date.available | 2017-02-01T08:26:21Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Menezes, A., and Ustaoğlu, B. (2008, March). Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Paper presented at the Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan (261-270). New York, N.Y. : ACM Press. | en_US |
dc.identifier.isbn | 9781595939791 | - |
dc.identifier.uri | http://doi.org/10.1145/1368310.1368348 | - |
dc.identifier.uri | http://hdl.handle.net/11147/4770 | - |
dc.description | ACM Symposium on Information, Computer and Communications Security, ASIACCS '08; Tokyo; Japan; 18 March 2008 through 20 March 2008 | en_US |
dc.description.abstract | The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 800-56A standard. The UM protocol is believed to possess all important security attributes including key authentication and secrecy, resistance to unknown key-share attacks, forward secrecy, resistance to known-session key attacks, and resistance to leakage of ephemeral private keys, but is known to succumb to key-compromise impersonation attacks. In this paper we present a strengthening of the Canetti-Krawczyk security definition for key agreement that captures resistance to all important attacks that have been identified in the literature with the exception of key-compromise impersonation attacks. We then present a reductionist security proof that the UM protocol satisfies this new definition in the random oracle model under the Gap Diffie-Hellman assumption. Copyright 2008 ACM. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.ispartof | ACM Symposium on Information, Computer and Communications Security, ASIACCS '08 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Network protocols | en_US |
dc.subject | Key agreement protocols | en_US |
dc.subject | NIST SP 800-56A | en_US |
dc.subject | Provable security | en_US |
dc.subject | Security model | en_US |
dc.title | Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard | en_US |
dc.type | Conference Object | en_US |
dc.authorid | TR102756 | en_US |
dc.institutionauthor | Ustaoğlu, Berkant | - |
dc.department | İzmir Institute of Technology. Mathematics | en_US |
dc.identifier.startpage | 261 | en_US |
dc.identifier.endpage | 270 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1145/1368310.1368348 | - |
dc.relation.doi | 10.1145/1368310.1368348 | en_US |
dc.coverage.doi | 10.1145/1368310.1368348 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
crisitem.author.dept | 04.02. Department of Mathematics | - |
Appears in Collections: | Mathematics / Matematik Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
20
checked on Nov 15, 2024
Page view(s)
202
checked on Nov 18, 2024
Download(s)
236
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.