Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping

نویسندگان

  • Jean-Sébastien Coron
  • Aline Gouget
  • Thomas Icart
  • Pascal Paillier
چکیده

We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem Sécurité. PACE v2 IM enjoys the following properties: – patent-freeness (to the best of current knowledge in the field); – full resistance to dictionary attacks, secrecy and forward secrecy in the security model agreed upon by the CEN TC224 WG16 group; – optimal performances. The PACE v2 IM protocol is intended to provide an alternative to the German PACE v1 protocol, which is also the German PACE v2 Generic Mapping (GM) protocol, proposed by the German Federal Office for Information Security (BSI). In this document, we provide – a description of PACE v2 IM, – a description of the security requirements one expects from a password-based key establishment protocol in order to support secure applications, – a security proof of PACE v2 IM in the so-called Bellare-Pointcheval-Rogaway (BPR) security model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of Psychological Intervention on Marital Satisfaction of Mothers with Slow Pace Under 5 Years Children

Objectives: Objective of this study was investigating impact of early psychological interventions on marital satisfaction of mothers with slow pace under 5 years children. Considering variables of the research, that is, early psychological interventions and marital satisfaction, research hypotheses was as follows: "early psychological interventions affect marital satisfaction of mothers with sl...

متن کامل

TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols

To establish a secure channel between two parties common security solutions often use a key exchange protocol as a preliminary subroutine to generate a shared key. These solutions include the protocols for secure communication between a reader and an identity card or passport, called PACE and EAC, and the TLS protocol for secure web communication. In this work we survey the cryptographic status...

متن کامل

Prediction of race pace in long distance running from blood lactate concentration around race pace

Muñoz-Pérez I, Moreno-Pérez D, Cardona-González C, Esteve-Lanao J. Prediction of race pace in long distance running from blood lactate concentration around race pace. J. Hum. Sport Exerc. Vol. 7, No. 4, pp. 763-769, 2012. The aim of this study was to develop an equation for predicting the performance in 10 kilometers road race (10k), Half Marathon (21k) and Marathon (42k), using the blood lacta...

متن کامل

Older adults' satisfaction with integrated capitated health and long-term care.

PURPOSE The objective of this study is to develop an instrument to evaluate satisfaction with care for older adults in capitated environments. Although satisfaction with care is now widely accepted as an important outcome measure, there are relatively few satisfaction measures developed or validated on older persons. Because many older persons are unable to respond to surveys, separate instrume...

متن کامل

Identification of the ventricular tachycardia isthmus after infarction by pace mapping.

BACKGROUND Ventricular tachycardia (VT) isthmuses can be defined by fixed or functional block. During sinus rhythm, pace mapping near the exit of an isthmus should produce a QRS similar to that of VT. Pace mapping at sites proximal to the exit may produce a similar QRS with a longer stimulus-to-QRS interval (S-QRS). The aim of the study was to determine whether a VT isthmus could be identified ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011