Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

被引:13
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cryptography; key agreement; authentication; leakage-resilience; generic bilinear group; SIGNATURE SCHEME; EXCHANGE; ENCRYPTION; CRYPTOGRAPHY; SECURE;
D O I
10.1109/ACCESS.2018.2799298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on users' permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (LR-AKA) resisting side-channel attacks has received significant attention from researchers. By side-channel attacks, an adversary is allowed to obtain fractional leakage information of private (secret) keys during the computation rounds of LR-AKA protocols. However, most LR-AKA protocols have a restriction, namely, the overall fractional leakage information must be bounded. In this paper, we propose an efficient LR-AKA protocol with overall unbounded leakage property in the continual leakage extended Canetti-Krawczyk model. Security analysis is given to demonstrate that our LR-AKA protocol is provably secure in the generic bilinear group model. By comparisons, our protocol is better than the previously proposed LR-AKA protocols in terms of computation cost, security model, and leakage properties.
引用
收藏
页码:17130 / 17142
页数:13
相关论文
共 50 条
[31]   Provably leakage-resilient three-party password-based authenticated key exchange [J].
Ruan, Ou ;
Wang, Qingping ;
Wang, Zihao .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) :163-173
[32]   Limits of a conjecture on a leakage-resilient cryptosystem [J].
Galindo, David ;
Vivek, Srinivas .
INFORMATION PROCESSING LETTERS, 2014, 114 (04) :192-196
[33]   Strongly leakage resilient authenticated key exchange, revisited [J].
Yang, Guomin ;
Chen, Rongmao ;
Mu, Yi ;
Susilo, Willy ;
Guo, Fuchun ;
Li, Jie .
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) :2885-2911
[34]   Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems [J].
Ho, Ting-Chieh ;
Tseng, Yuh-Min ;
Huang, Sen-Shan .
INFORMATICA, 2024, 35 (01) :131-154
[35]   Leakage-Resilient Key-Dependent Message Secure Encryption Schemes [J].
Gupta, Dhairya ;
Rajasree, Mahesh Sreekumar ;
Swaminathan, Harihar .
PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT I, 2025, 15495 :234-257
[36]   Leakage-Resilient Coin Tossing [J].
Boyle, Elette ;
Goldwasser, Shafi ;
Kalai, Yael Tauman .
DISTRIBUTED COMPUTING, 2011, 6950 :181-+
[37]   Leakage-Resilient Circuit Garbling [J].
Li, Ruiyang ;
Sun, Yiteng ;
Guo, Chun ;
Standaert, Francois-Xavier ;
Wang, Weijia ;
Wang, Xiao .
PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, :780-794
[38]   Provably leakage-resilient three-party password-based authenticated key exchange [J].
Ou Ruan ;
Qingping Wang ;
Zihao Wang .
Journal of Ambient Intelligence and Humanized Computing, 2019, 10 :163-173
[39]   RCB: leakage-resilient authenticated encryption via re-keying [J].
Megha Agrawal ;
Tarun Kumar Bansal ;
Donghoon Chang ;
Amit Kumar Chauhan ;
Seokhie Hong ;
Jinkeon Kang ;
Somitra Kumar Sanadhya .
The Journal of Supercomputing, 2018, 74 :4173-4198
[40]   Leakage-resilient group signature: Definitions and constructions [J].
Huang, Jianye ;
Huang, Qiong ;
Susilo, Willy .
INFORMATION SCIENCES, 2020, 509 :119-132