Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

被引:13
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cryptography; key agreement; authentication; leakage-resilience; generic bilinear group; SIGNATURE SCHEME; EXCHANGE; ENCRYPTION; CRYPTOGRAPHY; SECURE;
D O I
10.1109/ACCESS.2018.2799298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on users' permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (LR-AKA) resisting side-channel attacks has received significant attention from researchers. By side-channel attacks, an adversary is allowed to obtain fractional leakage information of private (secret) keys during the computation rounds of LR-AKA protocols. However, most LR-AKA protocols have a restriction, namely, the overall fractional leakage information must be bounded. In this paper, we propose an efficient LR-AKA protocol with overall unbounded leakage property in the continual leakage extended Canetti-Krawczyk model. Security analysis is given to demonstrate that our LR-AKA protocol is provably secure in the generic bilinear group model. By comparisons, our protocol is better than the previously proposed LR-AKA protocols in terms of computation cost, security model, and leakage properties.
引用
收藏
页码:17130 / 17142
页数:13
相关论文
共 50 条
[41]   Leakage-Resilient Storage Scheme for Cryptographic Applications [J].
Alawatugoda, Janaka ;
Ragel, Roshan ;
Eranga, Danushka ;
Jayanath, Nalaka ;
Somathilaka, Chinthaka .
2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS): INTEROPERABLE SUSTAINABLE SMART SYSTEMS FOR NEXT GENERATION, 2016,
[42]   RCB: leakage-resilient authenticated encryption via re-keying [J].
Agrawal, Megha ;
Bansal, Tarun Kumar ;
Chang, Donghoon ;
Chauhan, Amit Kumar ;
Hong, Seokhie ;
Kang, Jinkeon ;
Sanadhya, Somitra Kumar .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) :4173-4198
[43]   Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority [J].
Tseng, Yuh-Min ;
Huang, Sen-Shan ;
Tsai, Tung-Tso ;
Chuang, Yun-Hsin ;
Hung, Ying-Hao .
INFORMATICA, 2022, 33 (01) :151-179
[44]   Leakage-resilient Certificateless Signcryption Scheme [J].
Yang, Qiliang ;
Thou, Yanwei ;
Yu, Yong .
2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
[45]   Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys [J].
Fujioka, Atsushi ;
Suzuki, Koutarou .
TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 :121-141
[46]   Practical Leakage-Resilient Pseudorandom Generators [J].
Yu, Yu ;
Standaert, Francois-Xavier ;
Pereira, Olivier ;
Yung, Moti .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :141-151
[47]   Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model [J].
Alwen, Joel ;
Dodis, Yevgeniy ;
Wichs, Daniel .
ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 :36-54
[48]   Fully Leakage-Resilient Signatures [J].
Boyle, Elette ;
Segev, Gil ;
Wichs, Daniel .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :513-558
[49]   Leakage-Resilient Zero Knowledge [J].
Garg, Sanjam ;
Jain, Abhishek ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 :297-315
[50]   Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices [J].
Lai, Qiqi ;
Liu, Feng-Hao ;
Wang, Zhedong .
PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 :225-255