Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol

被引:10
|
作者
Tsai, Tung-Tso [1 ]
Huang, Sen-Shan [2 ]
Tseng, Yuh-Min [2 ]
Chuang, Yun-Hsin [2 ]
Hung, Ying-Hao [3 ]
机构
[1] Natl Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[3] Natl Expt High Sch, Dept Math, Hsinchu Sci Pk, Hsinchu 300, Taiwan
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2022年 / 3卷
关键词
Authenticated key exchange; certificate-based cryptography; generic bilinear group; leakage-resilience; AGREEMENT PROTOCOL; SECURE; SCHEME; CRYPTOGRAPHY; ENCRYPTION;
D O I
10.1109/OJCS.2022.3198073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity-based public key systems. In the past, many authenticated key exchange (AKE) protocols based on CB-PKC systems, called CB-AKE, were proposed to be applied to secure communications between two remote participants. However, these existing CB-AKE protocols become insecure since attackers could compute and obtain the whole secret key from some partial leaked information of the secret key by side channel attacks. In this paper, our goal is to propose the first CB-AKE protocol with the property to resist side channel attacks, called leakage-resilient CB-AKE (LR-CB-AKE). The proposed LR-CB-AKE protocol is formally proven to be secure in the generic bilinear group (GBG) model under the discrete logarithm (DL) and computational Diffie-Hellman (CDH) assumptions.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [21] Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model
    Ruan, Ou
    Chen, Jing
    Zhang, Mingwu
    IEEE ACCESS, 2017, 5 : 26832 - 26841
  • [22] After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Yuanyuan
    Zhang, Mingwu
    Zhou, Jing
    Harn, Lein
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2017 - 2026
  • [23] Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
    Zhou, Yanwei
    Xu, Yuan
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    THEORETICAL COMPUTER SCIENCE, 2021, 860 : 1 - 22
  • [24] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    INFORMATICA, 2023, 34 (01) : 199 - 222
  • [25] Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE ACCESS, 2019, 7 : 19041 - 19053
  • [26] Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2018, 6 : 17130 - 17142
  • [27] Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings
    Zhou, Yanwei
    Yang, Bo
    Wang, Tao
    Xia, Zhe
    Hou, Hongxia
    COMPUTER JOURNAL, 2020, 63 (04): : 508 - 524
  • [28] A simple leakage-resilient Authenticated Key Establishment protocol, its extensions, and applications
    Shin, S
    Kobara, K
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (03) : 736 - 754
  • [29] An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (06) : 1086 - 1101
  • [30] Leakage-resilient and proactive authenticated key exchange (LRP-AKE), reconsidered
    Shin S.
    Shin, SeongHan (seonghan.shin@aist.go.jp), 1880, Institute of Electronics Information Communication Engineers (104): : 1880 - 1893