Continuous after-the-fact leakage-resilient group password-authenticated key exchange

被引:0
作者
Ruan, Ou [1 ]
Wang, Zihao [1 ]
Wang, Qingping [1 ]
Zhang, Mingwu [1 ]
机构
[1] School of Computer Science, Hubei University of Technology, No.28, Nanli Road, Hongshan District, Wuhan City, Hubei Province, China
关键词
Authenticated key exchange - Cryptographic systems - Group key exchange protocols - Leakage-resilience - Leakage-resilient cryptographies - Partial information - Password-authenticated key exchange - Provable security;
D O I
10.6633/IJNS.20190921(5).19
中图分类号
学科分类号
摘要
During the past two decades, side-channel attacks have become a familiar method of attacking cryptographic systems, which allow an attacker to learn partial information about the internal secrets such as the secret key. A scheme that is secure in the traditional model will be vulnerable in the leakage environments, thus designing a strong, meaningful, and achievable security scheme to capture the practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we first formalize a continuous after-the-fact (AF) security model for leakage-resilient (LR) group password-authenticated key exchange (GPAKE) protocol, where the leakages are continuous and are allowed even after the adversary is given the challenges. Then, by combining Diffie-Hellman group key exchange protocol and Dziembowski-Faust leakageresilient storage scheme appropriately, we propose the first LR GPAKE protocol and present a formal security proof in the standard model. © 2019, International Journal of Network Security.
引用
收藏
页码:861 / 871
相关论文
empty
未找到相关数据