A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

被引:10
作者
Hsieh, Tsung-Che [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
关键词
Key exchange; key agreement; authentication; leakage-resilience; side-channel attacks; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; SIGNATURE SCHEME; SECURE; ENCAPSULATION; CRYPTOGRAPHY;
D O I
10.1109/ACCESS.2020.3006841
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE) protocol is an important primitive of the certificateless public-key cryptography. A CLAKE protocol is employed to provide both mutual authentication and establishing a session key between two participators. Indeed, all conventional public-key cryptographies have encountered a new kind of attack, named "side-channel attacks". Fortunately, leakage-resilient cryptography is a flexible approach to withstand such attacks. However, the design of leakage-resilient CLAKE (LR-CLAKE) protocols is not studied. In the article, by extending the well-known extended-Canetti-Krawczyk (eCK) model, we present the security notions (adversary model) of LR-CLAKE protocols, called continual-leakage-resilient eCK (CLReCK) model. The first LR-CLAKE protocol withstanding side-channel attacks is proposed. By employing the proof technique of the generic bilinear group (GBG) model, we formally prove the security of our protocol in the CLReCK model.
引用
收藏
页码:121795 / 121810
页数:16
相关论文
共 49 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Alawatugoda Janaka, 2015, Cryptography and Coding. 15th IMA International Conference, IMACC 2015. Proceedings: LNCS 9496, P277, DOI 10.1007/978-3-319-27239-9_17
[3]  
Alawatugoda J., 2014, ASIACCS, P207
[4]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[5]   A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks [J].
Bala, Suman ;
Verma, Anil K. .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 21 (02) :140-155
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]  
Biham E, 2008, LECT NOTES COMPUT SC, V5157, P221, DOI 10.1007/978-3-540-85174-5_13
[8]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37