Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

被引:13
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cryptography; key agreement; authentication; leakage-resilience; generic bilinear group; SIGNATURE SCHEME; EXCHANGE; ENCRYPTION; CRYPTOGRAPHY; SECURE;
D O I
10.1109/ACCESS.2018.2799298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on users' permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (LR-AKA) resisting side-channel attacks has received significant attention from researchers. By side-channel attacks, an adversary is allowed to obtain fractional leakage information of private (secret) keys during the computation rounds of LR-AKA protocols. However, most LR-AKA protocols have a restriction, namely, the overall fractional leakage information must be bounded. In this paper, we propose an efficient LR-AKA protocol with overall unbounded leakage property in the continual leakage extended Canetti-Krawczyk model. Security analysis is given to demonstrate that our LR-AKA protocol is provably secure in the generic bilinear group model. By comparisons, our protocol is better than the previously proposed LR-AKA protocols in terms of computation cost, security model, and leakage properties.
引用
收藏
页码:17130 / 17142
页数:13
相关论文
共 50 条
[21]   Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model [J].
Ruan, Ou ;
Chen, Jing ;
Zhang, Mingwu .
IEEE ACCESS, 2017, 5 :26832-26841
[22]   Leakage-Resilient and Lightweight Authenticated Key Exchange for E-Health [J].
Zeng, Wenjun ;
Zhang, Jie .
2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020), 2020, :162-166
[23]   Constructing Committing and Leakage-Resilient Authenticated Encryption [J].
Struck, Patrick ;
Weishaeupl, Maximiliane .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) :497-528
[24]   Leakage-Resilient Signatures [J].
Faust, Sebastian ;
Kiltz, Eike ;
Pietrzak, Krzysztof ;
Rothblum, Guy N. .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 :343-+
[25]   Leakage-resilient coin tossing [J].
Elette Boyle ;
Shafi Goldwasser ;
Yael Tauman Kalai .
Distributed Computing, 2014, 27 :147-164
[26]   A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices [J].
Tseng, Yuh-Min ;
Chen, Jian-Lun ;
Huang, Sen-Shan .
COMPUTER NETWORKS, 2021, 196
[27]   Fully Leakage-Resilient Signatures [J].
Boyle, Elette ;
Segev, Gil ;
Wichs, Daniel .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :89-+
[28]   Leakage-resilient coin tossing [J].
Boyle, Elette ;
Goldwasser, Shafi ;
Kalai, Yael Tauman .
DISTRIBUTED COMPUTING, 2014, 27 (03) :147-164
[29]   Continuous After-the-Fact Leakage-Resilient Key Exchange [J].
Alawatugoda, Janaka ;
Boyd, Colin ;
Stebila, Douglas .
INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 :258-273
[30]   Leakage-Resilient Key Exchange and Two-Seed Extractors [J].
Li, Xin ;
Ma, Fermi ;
Quach, Willy ;
Wichs, Daniel .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 :401-429