Secure deniable authenticated key establishment for Internet protocols

Meng Hui Lim, Sang Gon Lee, Youngho Park, Sangjae Moon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In 2003, Boyd et al. have proposed two deniable authenticated key establishment protocols for Internet Key Exchange (IKE). However, both schemes have been broken by Chou et al. in 2005 due to their susceptibility to key-compromise impersonation (KCI) attack. In this paper, we put forward the improved variants of both Boyd et al. 's schemes in order to defeat the KCI attack. On top of justifying our improvements, we further present a detailed security analysis to ensure that the desired security attributes: deniability and authenticity remain preserved.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages3-6
Number of pages4
DOIs
StatePublished - 2008
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 24 Apr 200826 Apr 2008

Publication series

NameProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

Conference

Conference2nd International Conference on Information Security and Assurance, ISA 2008
Country/TerritoryKorea, Republic of
CityBusan
Period24/04/0826/04/08

Fingerprint

Dive into the research topics of 'Secure deniable authenticated key establishment for Internet protocols'. Together they form a unique fingerprint.

Cite this