Ehud Aharoni, Allon Adir, et al.
PETS 2023
We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compiler and characterize the UA protocols that the compiler upgrades to the MA model, showing this to include a large and important class of UA protocols. The question, while natural, has not been studied widely. Our work is motivated in part by the ongoing work on the design of TLS 1.3, specifically the design of the client authentication mechanisms including the challenging case of post-handshake authentication. Our approach supports the analysis of these mechanisms in a general and modular way, in particular aided by the notion of "functional security" that we introduce as a generalization of key exchange models and which may be of independent interest.
Ehud Aharoni, Allon Adir, et al.
PETS 2023
Jonathan Bootle, Vadim Lyubashevsky, et al.
ESORICS 2021
Peter Fenner, Edward O. Pyzer-Knapp
AAAI 2020
Ehud Aharoni, Nir Drucker, et al.
CSCML 2023