Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

被引:13
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cryptography; key agreement; authentication; leakage-resilience; generic bilinear group; SIGNATURE SCHEME; EXCHANGE; ENCRYPTION; CRYPTOGRAPHY; SECURE;
D O I
10.1109/ACCESS.2018.2799298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on users' permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (LR-AKA) resisting side-channel attacks has received significant attention from researchers. By side-channel attacks, an adversary is allowed to obtain fractional leakage information of private (secret) keys during the computation rounds of LR-AKA protocols. However, most LR-AKA protocols have a restriction, namely, the overall fractional leakage information must be bounded. In this paper, we propose an efficient LR-AKA protocol with overall unbounded leakage property in the continual leakage extended Canetti-Krawczyk model. Security analysis is given to demonstrate that our LR-AKA protocol is provably secure in the generic bilinear group model. By comparisons, our protocol is better than the previously proposed LR-AKA protocols in terms of computation cost, security model, and leakage properties.
引用
收藏
页码:17130 / 17142
页数:13
相关论文
共 50 条
  • [21] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [22] Leakage-Resilient and Lightweight Authenticated Key Exchange for E-Health
    Zeng, Wenjun
    Zhang, Jie
    2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020), 2020, : 162 - 166
  • [23] Leakage-Resilient Signatures
    Faust, Sebastian
    Kiltz, Eike
    Pietrzak, Krzysztof
    Rothblum, Guy N.
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 343 - +
  • [24] Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model
    Ruan, Ou
    Chen, Jing
    Zhang, Mingwu
    IEEE ACCESS, 2017, 5 : 26832 - 26841
  • [25] Leakage-resilient coin tossing
    Elette Boyle
    Shafi Goldwasser
    Yael Tauman Kalai
    Distributed Computing, 2014, 27 : 147 - 164
  • [26] A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices
    Tseng, Yuh-Min
    Chen, Jian-Lun
    Huang, Sen-Shan
    COMPUTER NETWORKS, 2021, 196
  • [27] Leakage-resilient coin tossing
    Boyle, Elette
    Goldwasser, Shafi
    Kalai, Yael Tauman
    DISTRIBUTED COMPUTING, 2014, 27 (03) : 147 - 164
  • [28] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 89 - +
  • [29] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
  • [30] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173