Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9100)
- 1.7k Downloads
We provide a security analysis of the Modular Enhanced Symmetric Role Authentication (mERA) protocol. We prove that mERA is secure in the Bellare-Rogaway model, the standard model for analyzing the security of cryptographic protocols.
KeywordsRandom Oracle Certification Authority Random Oracle Model Forward Secrecy Oracle Query
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
- 1.AFNOR. Modular enhanced symmetric role authentication (mERA). Technical report (2010)Google Scholar
- 7.Harkins, D., Carrel, D.: The internet key exchange (IKE). RFC 2409, November 1998Google Scholar
- 10.Shoup, V., Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004). http://eprint.iacr.org/
© Springer-Verlag Berlin Heidelberg 2016