Security Attributes Sample Clauses
Security Attributes. A secure authenticated group key agreement protocol is desired to have the following attributes [9][10]: perfect forward secrecy if compromise of long-term keys of all the participating users does not compromise past session keys.
Security Attributes. In this section we will heuristically argue that the protocol satisfies the following security properties. Table 1 summarizes the security attributes of a selection of identity-based and certificateless authenticated key agreement protocols.
1. Known session key security (KnSK): As ephemeral values are used in generating session keys, a compromised session key does not compromise past or future sessions. All protocol runs, even when its participants remains the same, produce a different session key. An adversary’s inability to perform the key-replication attack as demon- strated in Section 5.4.3 also shows that the protocol provides known-key security.
2. Forward secrecy (FwS): We let this property constitute two separate parts; both to capture the forward secrecy against an outside adversary and against an adversary who posesses the KGC master key (or a cheating KGC).
Security Attributes. Set-Private-Key: generate the private key, SA = xADA.
Security Attributes. For simplicity, we assume both rings are of the same size, n. Apart from the conventional security properties for key agreement protocols, the security of ad-hoc anonymous key agreement protocols also depend on 1-out-of-n anonymity as described in Definition 3. These properties can be seen as a natural extension from the security requirements of key agreement protocol and those of ring signatures (e.g., see [20]).
