Authenticated key exchange under bad randomness

Guomin Yang*, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

8 Citations (Scopus)


We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks. We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomness situations respectively, and investigate the security of some widely used AKE protocols in these models by showing that they become insecure when the adversary is able to manipulate the randomness. On the positive side, we propose simple but generic methods to make AKE protocols secure in Reset-1 and Reset-2 models. The methods work in a modular way: first, we strengthen a widely used AKE protocol to achieve Reset-2 security, then we show how to transform any Reset-2 secure AKE protocol to a new one which also satisfies Reset-1 security.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security
Subtitle of host publication15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
EditorsGeorge Danezis
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Number of pages14
ISBN (Electronic)9783642275760
ISBN (Print)9783642275753
Publication statusPublished - 2012
Event15th International Conference on Financial Cryptography and Data Security, FC 2011 - Gros Islet, Saint Lucia
Duration: 28 Feb 20114 Mar 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7035 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


Other15th International Conference on Financial Cryptography and Data Security, FC 2011
CountrySaint Lucia
CityGros Islet


  • Authenticated Key Exchange
  • Bad Randomness
  • Resettable Cryptography

Fingerprint Dive into the research topics of 'Authenticated key exchange under bad randomness'. Together they form a unique fingerprint.

Cite this