Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication

(Extended Abstract)
  • Raphael C. -W. Phan
  • Kim-Kwang Raymond Choo
  • Swee-Huay Heng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4784)

Abstract

We revisit Shin et al.’s leakage-resilient password-based authenticated key establishment protocol (LR-AKEP) and the security model used to prove the security of LR-AKEP. By refining the Leak oracle in the security model, we show that LR-AKE (1) can, in fact, achieve a stronger notion of leakage-resilience than initially claimed and (2) also achieve an additional feature of traceability, not previously mentioned.

Keywords

Key establishment mutual athentication leakage-resilient 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585–604. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Fathi, H., Shin, S.-H., Kobara, K., Chakraborty, S.S., Imai, H., Prasad, R.: Leakage-Resilient Security Architecture for Mobile IPv6 in Wireless Overlay Networks. IEEE Journal on Selected Areas in Communications 23(11), 2182–2193 (2005)CrossRefGoogle Scholar
  5. 5.
    Itkis, G., Reyzin, L.: SiBIR: Signer-Base Intrusion-Resilient Signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 499–514. Springer, Heidelberg (2002)Google Scholar
  6. 6.
    Memon, N., Wong, P.W.: A Buyer-Seller Watermarking Protocol. IEEE Trans. on Image Processing 10(4) (2001)Google Scholar
  7. 7.
    Shin, S.-H., Kobara, K., Imai, H.: Leakage-Resilient Authenticated Key Establishment Protocols. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 155–172. Springer, Heidelberg (2003)Google Scholar
  8. 8.
    Shin, S.-H., Kobara, K., Imai, H.: A Simplified Leakage-Resilient Authenticated Key Establishment Protocol with Optimal Memory Size. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3421, Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Shin, S.-H., Kobara, K., Imai, H.: A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A(3), 736–754 (2005)CrossRefGoogle Scholar
  10. 10.
    Shin, S.-H., Kobara, K., Imai, H.: Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 269–284. Springer, Heidelberg (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Raphael C. -W. Phan
    • 1
  • Kim-Kwang Raymond Choo
    • 2
  • Swee-Huay Heng
    • 3
  1. 1.Laboratoire de sécurité et de cryptographie, EPFL, LausanneSwitzerland
  2. 2.CanberraAustralia
  3. 3.Centre for Cryptography and Information Security (CCIS), Faculty of Information Science and Technology, Multimedia UniversityMalaysia

Personalised recommendations