
Relations among Security Models for Authenticated Key Exchange
Author(s) -
Kwon Jeong Ok,
Jeong Ik Rae
Publication year - 2014
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.14.0113.1071
Subject(s) - computer security model , key (lock) , computer science , key exchange , computer security , authenticated key exchange , security association , cryptographic protocol , security service , protocol (science) , cloud computing security , security information and event management , information security , public key cryptography , cryptography , encryption , cloud computing , medicine , alternative medicine , pathology , operating system
Usually, key‐establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key‐establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key‐establishment protocol that is secure in a specific security model into a key‐establishment protocol that is still secure in a more restricted security model.