{"title":"Paradox Stems from the Security Model or the Security Proof?","authors":"Q. Pu, Jianmin Ding","doi":"10.1109/ISCSCT.2008.54","DOIUrl":null,"url":null,"abstract":"Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness of the security model. We defuse it by demonstrating that the attack can be captured in the BPR2000 model. Furthermore, we argue that the paradox is due to the flaws in the proof of security.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Computer Science and Computational Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCSCT.2008.54","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness of the security model. We defuse it by demonstrating that the attack can be captured in the BPR2000 model. Furthermore, we argue that the paradox is due to the flaws in the proof of security.