Security analysis of the eCK model

NI Liang,CHEN Gong-liang,LI Jian-hua
DOI: https://doi.org/10.6040/j.issn.1671-9352.1.2013.089
2013-01-01
Abstract:Authenticated key agreement(AKA) protocol should capture desirable security properties as many as possible.As a formal method recently proposed to design and analyze tw o-party AKA protocols,the eCK model is currently receiving more and more attention,and the exact security guarantees that can be provided by this model are w orthy of in-depth research.Hence,the relationship betw een the eCK model and the basic desirable security properties for AKA protocols is analyzed in detail.The conclusions indicate that AKA protocols w ith provable security in the eCK model capture most basic desirable security properties.Thereafter,the advantages and disadvantages of the eCK model are also summarized.
What problem does this paper attempt to address?