Security of a leakage-resilient protocol for key establishment and mutual authentication

3Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We revisit Shin et al.'s leakage-resilient password-based authenticated key establishment protocol (LR-AKEP) and the security model used to prove the security of LR-AKEP. By refining the Leak oracle in the security model, we show that LR-AKE (1) can, in fact, achieve a stronger notion of leakage-resilience than initially claimed and (2) also achieve an additional feature of traceability, not previously mentioned. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Phan, R. C. W., Choo, K. K. R., & Heng, S. H. (2007). Security of a leakage-resilient protocol for key establishment and mutual authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4784 LNCS, pp. 169–177). Springer Verlag. https://doi.org/10.1007/978-3-540-75670-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free