Welcome to the resource topic for 2005/190
Title:
Security Proof of “Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA”
Authors: SeongHan Shin, Kazukuni Kobara, Hideki Imai
Abstract:In this paper, we prove the security of the {\sf RSA-AKE} protocol
\cite{SKI05} in the random oracle model. The proof states that the
{\sf RSA-AKE} protocol is secure against an adversary who gets the
client’s stored secret \emph{or} the server’s RSA private
key.\footnote{The protocol is the same as \cite{SKI05}, but we
corrected the security proof partially. The attacks appeared in
\cite{TM05} are no longer available in the proof since the
adversary has access to either the client’s stored secret or the
server’s private key, not both of them.}
To our best knowledge, the {\sf RSA-AKE} protocol is the most
efficient among their kinds (i.e., RSA and password based AKE
protocols). The other security properties and efficiency
measurements of the {\sf RSA-AKE} protocol remain the same as in
\cite{SKI05}.
ePrint: https://eprint.iacr.org/2005/190
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .