Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication

(Extended Abstract)
  • Raphael C. -W. Phan
  • Kim-Kwang Raymond Choo
  • Swee-Huay Heng
Conference paper

DOI: 10.1007/978-3-540-75670-5_11

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4784)
Cite this paper as:
Phan R.C.W., Choo KK.R., Heng SH. (2007) Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. In: Susilo W., Liu J.K., Mu Y. (eds) Provable Security. ProvSec 2007. Lecture Notes in Computer Science, vol 4784. Springer, Berlin, Heidelberg

Abstract

We revisit Shin et al.’s leakage-resilient password-based authenticated key establishment protocol (LR-AKEP) and the security model used to prove the security of LR-AKEP. By refining the Leak oracle in the security model, we show that LR-AKE (1) can, in fact, achieve a stronger notion of leakage-resilience than initially claimed and (2) also achieve an additional feature of traceability, not previously mentioned.

Keywords

Key establishment mutual athentication leakage-resilient 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Raphael C. -W. Phan
    • 1
  • Kim-Kwang Raymond Choo
    • 2
  • Swee-Huay Heng
    • 3
  1. 1.Laboratoire de sécurité et de cryptographie, EPFL, LausanneSwitzerland
  2. 2.CanberraAustralia
  3. 3.Centre for Cryptography and Information Security (CCIS), Faculty of Information Science and Technology, Multimedia UniversityMalaysia

Personalised recommendations