Blake-Wilson, Johnson & Menezes protocol revisited

Hai Huang, Zhen Fu Cao*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, we investigate the famous Blake-Wilson, Johnson & Menezes (BJM) authenticated key exchange protocols. We observe that the BJM model fails to model the adversary's capability in the public setting well. We modify the BJM model by providing it with a new Register query and a modified Corrupt query. This way, we bring the BJM model further to practice. Moreover, our modification has a significant impact on the security proof of the BJM protocols. Specifically, the security proofs using CDH assumption will no longer work in the modified BJM model. With some modifications, we show that the BJM protocols are secure in the modified BJM model under the gap Diffie-Hellman assumption (GDH).

Original languageEnglish
Pages (from-to)1365-1374
Number of pages10
JournalScience China Information Sciences
Volume54
Issue number7
DOIs
StatePublished - Jul 2011
Externally publishedYes

Keywords

  • BJM model
  • authenticated key exchange
  • gap Diffie-Hellman
  • provable security

Fingerprint

Dive into the research topics of 'Blake-Wilson, Johnson & Menezes protocol revisited'. Together they form a unique fingerprint.

Cite this