## CryptoDB

### Paper: Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange

Authors: Robert W. Zhu Xiaojian Tian Duncan S. Wong URL: http://eprint.iacr.org/2005/455 Search ePrint Search Google In 2001, Canetti and Krawczyk proposed a security model (CK-model) for authentication protocols. They also gave an indistinguishability-based definition for key exchange protocols. Since then the model has almost exclusively been used for analyzing key exchange protocols, although it can be applied to authentication protocols in general. The model not only captures a large class of attacks but also provides a modular approach to the design of authentication protocols. However, the model does not capture the property of Key Compromise Impersonation (KCI) Resilience. Until now, analysis concerning this property has mostly been done heuristically and restricted to key exchange protocols only. Previous attempts on formalizing KCI have mostly been done in some ad hoc manner and additional proofs have to be given, specifically for the security of KCI resilience. In this paper, we propose an extension to the CK-model, which allows, for the first time, the KCI attacks to be considered in authentication protocols in general, rather than restricted to key exchange protocols, and no more additional proofs are required specifically for KCI security. With the revival of interest in identity-based (ID-based) cryptography, there have been many new ID-based key exchange protocols proposed. Despite the fact that some of them have been proven in some restricted versions of a model proposed by Bellare and Rogaway in 1993 and some others have been proven in the original CK-model, there is no rigorous model specifically for ID-based key exchange security. In particular, forward secrecy against compromised Key Generation Server (KGS-FS) has never been captured even though this notion is more important and stronger than the perfect forward secrecy in ID-based key exchange. For this, we further extend our model to ID-based setting and capture the property of KGS-FS for ID-based key exchange security.
##### BibTeX
@misc{eprint-2005-12788,
title={Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange},
booktitle={IACR Eprint archive},
keywords={cryptographic protocols, CK-model, ID-based cryptography},
url={http://eprint.iacr.org/2005/455},
note={ xjtian@cityu.edu.hk 13312 received 13 Dec 2005, last revised 12 Jun 2006},
author={Robert W. Zhu and Xiaojian Tian and Duncan S. Wong},
year=2005
}