Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

被引:13
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cryptography; key agreement; authentication; leakage-resilience; generic bilinear group; SIGNATURE SCHEME; EXCHANGE; ENCRYPTION; CRYPTOGRAPHY; SECURE;
D O I
10.1109/ACCESS.2018.2799298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on users' permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (LR-AKA) resisting side-channel attacks has received significant attention from researchers. By side-channel attacks, an adversary is allowed to obtain fractional leakage information of private (secret) keys during the computation rounds of LR-AKA protocols. However, most LR-AKA protocols have a restriction, namely, the overall fractional leakage information must be bounded. In this paper, we propose an efficient LR-AKA protocol with overall unbounded leakage property in the continual leakage extended Canetti-Krawczyk model. Security analysis is given to demonstrate that our LR-AKA protocol is provably secure in the generic bilinear group model. By comparisons, our protocol is better than the previously proposed LR-AKA protocols in terms of computation cost, security model, and leakage properties.
引用
收藏
页码:17130 / 17142
页数:13
相关论文
共 50 条
  • [1] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices
    Peng, An-Li
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5343 - 5354
  • [2] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [3] A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks
    Hsieh, Tsung-Che
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE ACCESS, 2020, 8 (08): : 121795 - 121810
  • [4] An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol
    Ruan, Ou
    Yang, Yang
    Zhang, Mingwu
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 665 - 674
  • [5] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [6] Leakage-Resilient Certificateless Signature Under Continual Leakage Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02): : 363 - 386
  • [7] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [8] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [9] Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE ACCESS, 2023, 11 : 54448 - 54461
  • [10] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979