Common use of Security in CK model Clause in Contracts

Security in CK model. The scheme is not resistant in the CK security model if the private keys dA and dB of the SM and SP respectively are leaked. This follows from the fact that CA = CB = dB AA and DA = DB = ▇▇▇▇. As a result, the adversary is able to compute SK = H(▇▇▇ IDB CA DA) and the security of the session key is broken.

Appears in 2 contracts

Sources: Key Agreement, Open Access License

Security in CK model. The scheme is not resistant in the CK security model if the private keys dA and dB of the SM and SP respectively are leaked. This follows from the fact that CA = CB = dB AA and DA = DB = ▇▇▇▇. As a result, the adversary is able to compute SK = H(▇▇▇ IDB CA DAH(IDAǁIDBǁCAǁDA) and the security of the session key is broken.

Appears in 2 contracts

Sources: Key Agreement, Key Agreement