[Resource Topic] 2009/515: Blake-Wilson, Johnson and Menezes Protocol Revisited

Welcome to the resource topic for 2009/515

Title:
Blake-Wilson, Johnson and Menezes Protocol Revisited

Authors: Hai Huang, Zhenfu Cao

Abstract:

In this paper, we investigate the famous Blake-Wilson, Johnson & Menezes (BJM) authenticated key exchange protocols. We observe that the Corrupt query in the BJM model is not very reasonable, i.e. it fails to model the adversary’s capability well. We modify the BJM model by providing it with a new Corrupt query. By this way, we bring the BJM model further to the practice. Besides, our modification has a significant impact on the security proofs of the BJM protocols. Specifically, the security proofs using CDH assumption will no longer work in the modified BJM model.With slight modification, we show that the BJM protocols are secure in the modified BJM model under the gap Diffie-Hellman assumption (GDH).

ePrint: https://eprint.iacr.org/2009/515

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .