Relations among security models for authenticated key exchange

Jeong Ok Kwon, Ik Rae Jeong

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)


Usually, key-establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key-establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key-establishment protocol that is secure in a specific security model into a key-establishment protocol that is still secure in a more restricted security model.

Original languageEnglish
Pages (from-to)856-864
Number of pages9
JournalETRI Journal
Issue number5
Publication statusPublished - 2014 Oct 1

Bibliographical note

Publisher Copyright:
© 2014 ETRI.


  • Compiler
  • HMQV
  • KAM
  • Key establishment
  • Security model

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • General Computer Science
  • Electrical and Electronic Engineering

Cite this