Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal

@article{Cremers2015BeyondEP,
  title={Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal},
  author={C. Cremers and M. Feltz},
  journal={Designs, Codes and Cryptography},
  year={2015},
  volume={74},
  pages={183-218}
}
  • C. Cremers, M. Feltz
  • Published 2015
  • Mathematics, Computer Science
  • Designs, Codes and Cryptography
We show that it is possible to achieve perfect forward secrecy (PFS) in two-message or one-round key exchange (KE) protocols even in the presence of very strong active adversaries that can reveal random values of sessions and compromise long-term secret keys of parties. We provide two new game-based security models for KE protocols with increasing security guarantees, namely, eCK$$^{w}$$w and eCK-PFS. The eCK$$^{w}$$w model is a slightly stronger variant of the extended Canetti–Krawczyk (eCK… Expand
34 Citations
0-RTT Key Exchange with Full Forward Secrecy
  • 42
  • PDF
On Continuous After-the-Fact Leakage-Resilient Key Exchange
  • M. Toorani
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2014
  • 18
  • PDF
Multi-cast key distribution: scalable, dynamic and provably secure construction
  • Highly Influenced
  • PDF
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3
  • 4
  • PDF
Authenticated Key Exchange from Ideal Lattices
  • 96
  • PDF
Future-Proofing Key Exchange Protocols
  • PDF
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
  • 20
  • PDF
On Post-compromise Security
  • 69
  • PDF
...
1
2
3
4
...

References

SHOWING 1-10 OF 36 REFERENCES
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
  • 49
  • PDF
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
  • 40
  • PDF
Security Analysis of KEA Authenticated Key Exchange Protocol
  • 88
  • PDF
Scalable Protocols for Authenticated Group Key Exchange
  • 235
  • PDF
Stronger Security of Authenticated Key Exchange
  • 545
  • PDF
On Forward Secrecy in One-Round Key Exchange
  • 28
  • PDF
HMQV: A High-Performance Secure Diffie-Hellman Protocol
  • 638
  • PDF
...
1
2
3
4
...