Brendel, Jacqueline ; Fischlin, Marc
Hrsg.: Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (2017)
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings
doi: 10.1007/978-3-319-66402-6
Buchkapitel, Bibliographie
Kurzbeschreibung (Abstract)
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that also the EAC protocol can be augmented to support a 0RTT mode. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting.
Typ des Eintrags: | Buchkapitel |
---|---|
Erschienen: | 2017 |
Herausgeber: | Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar |
Autor(en): | Brendel, Jacqueline ; Fischlin, Marc |
Art des Eintrags: | Bibliographie |
Titel: | Zero Round-Trip Time for the Extended Access Control Protocol |
Sprache: | Englisch |
Publikationsjahr: | September 2017 |
Ort: | Cham |
Verlag: | Springer International Publishing |
(Heft-)Nummer: | 10492 |
Buchtitel: | Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings |
Reihe: | Lecture notes in computer science |
Band einer Reihe: | 1 |
DOI: | 10.1007/978-3-319-66402-6 |
Kurzbeschreibung (Abstract): | The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that also the EAC protocol can be augmented to support a 0RTT mode. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting. |
Freie Schlagworte: | cryptographic protocols / zero-RTT protocols, authenticated key exchange, extended access control protocol,Solutions; S4 |
ID-Nummer: | TUD-CS-2017-0212 |
Zusätzliche Informationen: | Privacy and Trust for Mobile Users specific fields== Involved Privacy and Trust sub-projects: D.2; Solutions; S4 |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Kryptographie und Komplexitätstheorie DFG-Sonderforschungsbereiche (inkl. Transregio) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche DFG-Graduiertenkollegs DFG-Graduiertenkollegs > Graduiertenkolleg 2050 Privacy and Trust for Mobile Users Profilbereiche Profilbereiche > Cybersicherheit (CYSEC) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen |
Hinterlegungsdatum: | 07 Aug 2017 13:19 |
Letzte Änderung: | 08 Mai 2024 10:06 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |