Deniable Authenticated Key Establishment for Internet Protocols


Autoria(s): Boyd, Colin; Mao, Wenbo; Paterson, Kenneth
Contribuinte(s)

Christianson, B

Crispo, B

Malcolm, J

Roe, M

Data(s)

2005

Resumo

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/25481/

Publicador

Springer-Verlag

Relação

http://eprints.qut.edu.au/25481/1/25481_boyd_2006001782.pdf

DOI:10.1007/11542322_31

Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080499 Data Format not elsewhere classified #089999 Information and Computing Sciences not elsewhere classified #Key Establishment, Deniability, Information Security
Tipo

Journal Article