TU Darmstadt / ULB / TUbiblio

Zero Round-Trip Time for the Extended Access Control Protocol

Brendel, Jacqueline ; Fischlin, Marc
Hrsg.: Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (2017)
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings
doi: 10.1007/978-3-319-66402-6
Buchkapitel, Bibliographie

Kurzbeschreibung (Abstract)

The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that also the EAC protocol can be augmented to support a 0RTT mode. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting.

Typ des Eintrags: Buchkapitel
Erschienen: 2017
Herausgeber: Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar
Autor(en): Brendel, Jacqueline ; Fischlin, Marc
Art des Eintrags: Bibliographie
Titel: Zero Round-Trip Time for the Extended Access Control Protocol
Sprache: Englisch
Publikationsjahr: September 2017
Ort: Cham
Verlag: Springer International Publishing
(Heft-)Nummer: 10492
Buchtitel: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings
Reihe: Lecture notes in computer science
Band einer Reihe: 1
DOI: 10.1007/978-3-319-66402-6
Kurzbeschreibung (Abstract):

The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. While originally used in the context of identity card systems and machine readable travel documents, the EAC protocol is increasingly adopted as a universal solution to secure transactions or for attribute-based access control with smart cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that also the EAC protocol can be augmented to support a 0RTT mode. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting.

Freie Schlagworte: cryptographic protocols / zero-RTT protocols, authenticated key exchange, extended access control protocol,Solutions; S4
ID-Nummer: TUD-CS-2017-0212
Zusätzliche Informationen:

Privacy and Trust for Mobile Users specific fields== Involved Privacy and Trust sub-projects: D.2; Solutions; S4

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Kryptographie und Komplexitätstheorie
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Graduiertenkolleg 2050 Privacy and Trust for Mobile Users
Profilbereiche
Profilbereiche > Cybersicherheit (CYSEC)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Hinterlegungsdatum: 07 Aug 2017 13:19
Letzte Änderung: 08 Mai 2024 10:06
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen