Skip to main content
Log in

Security model and modular design of fair authentication key exchange protocols

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such protocols be run under the circumstances where ones do not trust in each other. Therefore, in this paper we propose the idea of fair authentication key exchange (FAKE), which has not only the basic properties of AKE protocols, but also some new properties: the “session proof” embedded in the input of protocols by the customer; and if not revealed, the protocols have the deniability, otherwise the transcript of protocol is binding for the identifications. Such a method is capable of solving the contradiction between protecting privacy and the dissension on network service. Then the security model of FAKE protocols is formulated systematically and a flaw of the security model of current signature schemes proposed by Kudla is also corrected. Finally, a kind of FAKE protocol based on current signature schemes is designed and the mBJM-AK security, conditional deniability and fairness of FAKE protocols are proved in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cham D. Untraceable electronic mail, return address and digital pseudonyms. Commun ACM, 1981, 24: 84–88

    Article  Google Scholar 

  2. Chaum D, Antwerpen H V. Undeniable signatures. In: Brassard G, ed. Advances in Cryptology-Proc. of CRYPTO’89, LNCS 435. Berlin: Springer-Verlag, 1990. 212–226

    Chapter  Google Scholar 

  3. Chor B, Goldreich O, Kushilevitz E, et al. Private information retrieval. In: Proc. of 36th FOCS, Milwaukee, 1995. 41–50

  4. Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications. In: Maurer U M, ed. Advances in Cryptology—Proc. of EUROCRYPT’96, LNCS 1070. Berlin: Springer-Verlag, 1996. 143–154

    Google Scholar 

  5. Dwork C, Naor M, Sahai A. Concurrent zero-knowledge. In: Kleinberg J M, ed. In: Proc. of 30th Sysposium on Theory of Computing (STOC). New York: ACM Press, 1998. 409–418

    Google Scholar 

  6. Naor M. Deniable ring authentication. In: Stinson D R, ed. Advances in Cryptology—Proc. of CRYPTO02, LNCS 2442. Berlin: Springer-Verlag, 2002. 481–498

    Google Scholar 

  7. Raimondo M D, Gennaro R. New approaches for deniable authentication. In: Atluri V, ed. Proc. of 12th ACM Conference on Computer and Communications Security (CCS’05). New York: ACM Press, 2005. 81–89

    Google Scholar 

  8. Rivest R, Shamir R, Tauman Y. How to leak a secret. In: Boyd C, ed. Advances in Cryptology—Proc. of ASIACRYPT’ 01, LNCS 2248. Berlin: Springer-Verlag, 2001. 552–565

    Google Scholar 

  9. Chen W D, Feng D G. Signature scheme for specified threshold verifiers and security proofs (in Chinese). J Software, 2005, 16: 1967–1974

    Article  MATH  MathSciNet  Google Scholar 

  10. Kudla C. Special signature scheme and key agreement protocols. Thesis for the Degree of Doctor of Philosophy. London: Information Security Group Department of Mathematics Royal Hollway, University of London, 2006

    Google Scholar 

  11. Raimondo M, Gennaro R, Krawczyk H. Deniable authentication and key exchange. In: Atluri V, ed. Proc. of 12th ACM Conference on Computer and Communications Security (CCS’05). New York: ACM Press, 2005. 112–121

    Chapter  Google Scholar 

  12. Kudla C, Paterson K G. Modular security proofs for key agreement protocols. In: Bimal R, ed. Advances in Cryptology-ASIACRYPT 2005. Berlin: Springer, 2005. 549–565

    Chapter  Google Scholar 

  13. Okamoto T, Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim K, ed. Public Key Cryptography-PKC 2001,volume 1992 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2001. 104–118

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to DengGuo Feng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Feng, D., Chen, W. Security model and modular design of fair authentication key exchange protocols. Sci. China Inf. Sci. 53, 278–287 (2010). https://doi.org/10.1007/s11432-010-0033-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-0033-9

Keywords

Navigation