Vis enkel innførsel

dc.contributor.authorBoyd, Colin Alexander
dc.contributor.authorDavies, Gareth T.
dc.contributor.authorde Kock, Bor
dc.contributor.authorGellert, Kai
dc.contributor.authorJager, Tibor
dc.contributor.authorMillerjord, Lise
dc.date.accessioned2022-04-05T07:32:02Z
dc.date.available2022-04-05T07:32:02Z
dc.date.created2021-12-06T11:13:25Z
dc.date.issued2021
dc.identifier.citationLecture Notes in Computer Science (LNCS). 2021, Advances in Cryptology - ASIACRYPT 2021 681-710.en_US
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2989781
dc.description.abstractWe construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous security proofs in a strong security model, all have low communication complexity, and are particularly suitable for resource-constrained devices. We describe three protocols that apply linear key evolution to provide different performance and security properties. Correctness in parallel and concurrent protocol sessions is difficult to achieve for linearly key-evolving protocols, emphasizing the need for assurance of availability alongside the usual confidentiality and authentication security goals. We introduce synchronization robustness as a new formal security goal, which essentially guarantees that parties can re-synchronize efficiently. All of our new protocols achieve this property. Since protocols based on linear key evolution cannot guarantee that all concurrently initiated sessions successfully derive a key, we also propose two constructions with non-linear key evolution based on puncturable PRFs. These are instantiable from standard hash functions and require O(C⋅log(|CTR|)) memory, where C is the number of concurrent sessions and |CTR| is an upper bound on the total number of sessions per party. These are the first protocols to simultaneously achieve full forward security, synchronization robustness, and concurrent correctness.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleSymmetric Key Exchange with Full Forward Security and Robust Synchronizationen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.rights.holderThis is the authors' accepted manuscript to an article published by Springer.en_US
dc.source.pagenumber681-710en_US
dc.source.volumeAdvances in Cryptology - ASIACRYPT 2021en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doi10.1007/978-3-030-92068-5_23
dc.identifier.cristin1964969
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel