would take into account the above-mentioned remarks
for future work.
SIM–BMP
0
IND–RoR SIM–BMP
IND–FtG SIM–UC
Figure 2: Relation between PAKE security definitions. In
dashed arrows are the new results of this paper.
ACKNOWLEDGEMENTS
We are especially grateful to Jean Lancrenon for all
his suggestions and fruitful discussions. This work
was supported by the Luxembourg National Research
Fund (CORE project AToMS and CORE Junior grant
no. 11299247).
REFERENCES
Abdalla, M., Benhamouda, F., and MacKenzie, P. (2015).
Security of the J-PAKE Password Authenticated Key
Exchange Protocol. In 2015 IEEE Symposium on Se-
curity and Privacy, SP 2015, pages 571–587. IEEE
Computer Society.
Abdalla, M., Fouque, P., and Pointcheval, D. (2005).
Password-Based Authenticated Key Exchange in the
Three-Party Setting. In Vaudenay, S., editor, Public-
Key Cryptography – PKC 2005, volume 3386 of
LNCS, pages 65–84. Springer.
Bellare, M., Canetti, R., and Krawczyk, H. (1998). A Mod-
ular Approach to the Design and Analysis of Authen-
tication and Key Exchange Protocols. In Vitter, J. S.,
editor, Proceedings of the Thirtieth Annual ACM Sym-
posium on the Theory of Computing, STOC ’98, pages
419–428. ACM.
Bellare, M., Pointcheval, D., and Rogaway, P. (2000).
Authenticated Key Exchange Secure Against Dictio-
nary Attacks. In Advances in Cryptology – EURO-
CRYPT 2000, volume 1807 of LNCS, pages 139–155.
Springer.
Bellare, M. and Rogaway, P. (1993). Entity Authentication
and Key Distribution. In Stinson, D. R., editor, Ad-
vances in Cryptology — CRYPTO 1993, volume 773
of LNCS, pages 232–249. Springer.
Bellare, M. and Rogaway, P. (1995). Provably Secure
Session Key Distribution: the three party case. In
Leighton, F. T. and Borodin, A., editors, Proceedings
of the Twenty-Seventh Annual ACM Symposium on
Theory of Computing, STOC ’95, pages 57–66. ACM.
Bellovin, S. M. and Merritt, M. (1992). Encrypted Key
Exchange: Password-Based Protocols Secure Against
Dictionary Attacks. In 1992 IEEE Symposium on Re-
search in Security and Privacy, SP 1992, pages 72–84.
Blake-Wilson, S. and Menezes, A. (1997). Entity Authen-
tication and Authenticated Key Transport Protocols
Employing Asymmetric Techniques. In Christianson,
B., Crispo, B., Lomas, T. M. A., and Roe, M., edi-
tors, Security Protocols, 5th International Workshop,
volume 1361 of LNCS, pages 137–158. Springer.
Boyko, V., MacKenzie, P. D., and Patel, S. (2000). Provably
Secure Password-Authenticated Key Exchange Using
Diffie-Hellman. In Preneel, B., editor, Advances in
Cryptology – EUROCRYPT 2000, volume 1807 of
LNCS, pages 156–171. Springer.
Brzuska, C., Fischlin, M., Warinschi, B., and Williams,
S. C. (2011). Composability of Bellare-Rogaway Key
Exchange Protocols. In Chen, Y., Danezis, G., and
Shmatikov, V., editors, Proceedings of the 18th ACM
Conference on Computer and Communications Secu-
rity, CCS 2011, pages 51–62. ACM.
Canetti, R. (2001). Universally Composable Security: A
New Paradigm for Cryptographic Protocols. In 42nd
Annual Symposium on Foundations of Computer Sci-
ence, FOCS 2001, pages 136–145. IEEE Computer
Society.
Canetti, R., Halevi, S., Katz, J., Lindell, Y., and MacKen-
zie, P. D. (2005). Universally Composable Password-
Based Key Exchange. In Cramer, R., editor, Advances
in Cryptology – EUROCRYPT 2005, volume 3494 of
LNCS, pages 404–421. Springer.
Canetti, R. and Krawczyk, H. (2001). Analysis of Key-
Exchange Protocols and Their Use for Building Se-
cure Channels. In Pfitzmann, B., editor, Advances
in Cryptology - EUROCRYPT 2001, volume 2045 of
LNCS, pages 453–474. Springer.
Canetti, R. and Krawczyk, H. (2002). Universally Com-
posable Notions of Key Exchange and Secure Chan-
nels. In Knudsen, L. R., editor, Advances in Cryp-
tology - EUROCRYPT 2002, volume 2332 of LNCS,
pages 337–351. Springer.
Clarke, D. and Hao, F. (2014). Cryptanalysis of the Dragon-
fly Key Exchange Protocol. IET Information Security,
8(6):283–289.
Cremers, C. (2011). Examining Indistinguishability-based
Security Models for Key Exchange Protocols: the
case of CK, CK-HMQV, and eCK. In Proceedings
of the 6th ACM Symposium on Information, Computer
and Communications Security, ASIACCS 2011, pages
80–91. ACM.
Goldreich, O. and Lindell, Y. (2001). Session-Key Gen-
eration Using Human Passwords Only. In Kilian, J.,
editor, Advances in Cryptology — CRYPTO 2001, vol-
ume 2139 of LNCS, pages 408–432. Springer.
IEEE P1363.2 (2002). Standard Specifications for
Password-Based Public Key Cryptographic Tech-
niques. Standard, IEEE Standards Association, Pis-
cataway, NJ, USA.
ISO/IEC 11770-4:2006 (2009). ISO/IEC 11770-4:2006/cor
1:2009, Information Technology – Security tech-
niques – Key Management – Part 4: Mechanisms
On the Relation Between SIM and IND-RoR Security Models for PAKEs
161