Errors in Computational Complexity Proofs for Protocols

  • Kim-Kwang Raymond Choo
  • Colin Boyd
  • Yvonne Hitchcock
Conference paper

DOI: 10.1007/11593447_34

Volume 3788 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Choo KK.R., Boyd C., Hitchcock Y. (2005) Errors in Computational Complexity Proofs for Protocols. In: Roy B. (eds) Advances in Cryptology - ASIACRYPT 2005. ASIACRYPT 2005. Lecture Notes in Computer Science, vol 3788. Springer, Berlin, Heidelberg

Abstract

Proofs are invaluable tools in assuring protocol implementers about the security properties of protocols. However, several instances of undetected flaws in the proofs of protocols (resulting in flawed protocols) undermine the credibility of provably-secure protocols. In this work, we examine several protocols with claimed proofs of security by Boyd & González Nieto (2003), Jakobsson & Pointcheval (2001), and Wong & Chan (2001), and an authenticator by Bellare, Canetti, & Krawczyk (1998). Using these protocols as case studies, we reveal previously unpublished flaws in these protocols and their proofs. We hope our analysis will enable similar mistakes to be avoided in the future.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kim-Kwang Raymond Choo
    • 1
  • Colin Boyd
    • 1
  • Yvonne Hitchcock
    • 1
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia