J4 ›› 2013, Vol. 48 ›› Issue (7): 46-50.

• Articles • Previous Articles     Next Articles

Security analysis of the eCK model

NI Liang1,2,3, CHEN Gong-liang3, LI Jian-hua3   

  1. 1. School of Computer Science, Zhongyuan University of Technology, Zhengzhou 450007, Henan, China;
    2. Henan Province Engineering Laboratory of Computer Information System Security Assessment, Zhengzhou 450007,
    Henan, China;  3. School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
  • Received:2013-06-17 Published:2013-12-03

Abstract:

Authenticated key agreement (AKA) protocol should capture desirable security properties as many as possible. As a formal method recently proposed to design and analyze two-party AKA protocols, the eCK model is currently receiving more and more attention, and the exact security guarantees that can be provided by this model are worthy of in-depth research. Hence, the relationship between the eCK model and the basic desirable security properties for AKA protocols is analyzed in detail. The conclusions indicate that AKA protocols with provable security in the eCK model capture most basic desirable security properties. Thereafter, the advantages and disadvantages of the eCK model are also summarized.

Key words: authenticated key agreement protocol; eCK model; provable security

CLC Number: 

  • TP309
[1] QIU Xiu-feng1,2, LIU Jian-wei1, WU Qian-hong1, LIU Jian-hua1. Multipath interdomain routing decision verification protocol [J]. J4, 2013, 48(7): 39-45.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!