Leakage-resilient authenticated key establishment protocols

被引:0
作者
Shin, SH [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003 | 2003年 / 2894卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we review AKE protocols from a little bit different point of view, i.e. the relationship between information a client needs to possess (for authentication) and immunity to the respective leakage of stored secrets from a client side and a server side. Since the information leakage would be more conceivable than breaking down the underlying cryptosystems, it is desirable to enhance the immunity to the leakage. First and foremost, we categorize AKE protocols according to how much resilience against the leakage can be provided. Then, we propose new AKE protocols that have immunity to the leakage of stored secrets from a client and a server (or servers), respectively. And we extend our protocols to be possible for updating secret values registered in server(s) or password remembered by a client.
引用
收藏
页码:155 / 172
页数:18
相关论文
共 35 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P441
[2]  
ANDERSON R, 2000, 549 U CAMB
[3]  
[Anonymous], 1999, LNCS
[4]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[5]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[6]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[7]  
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[8]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[9]  
Bresson E, 2002, LECT NOTES COMPUT SC, V2501, P497
[10]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255