Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol

被引:10
|
作者
Tsai, Tung-Tso [1 ]
Huang, Sen-Shan [2 ]
Tseng, Yuh-Min [2 ]
Chuang, Yun-Hsin [2 ]
Hung, Ying-Hao [3 ]
机构
[1] Natl Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[3] Natl Expt High Sch, Dept Math, Hsinchu Sci Pk, Hsinchu 300, Taiwan
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2022年 / 3卷
关键词
Authenticated key exchange; certificate-based cryptography; generic bilinear group; leakage-resilience; AGREEMENT PROTOCOL; SECURE; SCHEME; CRYPTOGRAPHY; ENCRYPTION;
D O I
10.1109/OJCS.2022.3198073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity-based public key systems. In the past, many authenticated key exchange (AKE) protocols based on CB-PKC systems, called CB-AKE, were proposed to be applied to secure communications between two remote participants. However, these existing CB-AKE protocols become insecure since attackers could compute and obtain the whole secret key from some partial leaked information of the secret key by side channel attacks. In this paper, our goal is to propose the first CB-AKE protocol with the property to resist side channel attacks, called leakage-resilient CB-AKE (LR-CB-AKE). The proposed LR-CB-AKE protocol is formally proven to be secure in the generic bilinear group (GBG) model under the discrete logarithm (DL) and computational Diffie-Hellman (CDH) assumptions.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [31] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [32] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173
  • [33] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [34] Integrating identity-based and certificate-based authenticated key exchange protocols
    Berkant Ustaoğlu
    International Journal of Information Security, 2011, 10 : 201 - 212
  • [35] Integrating identity-based and certificate-based authenticated key exchange protocols
    Ustaoglu, Berkant
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (04) : 201 - 212
  • [36] Certificate-Based Authenticated Key Agreement Protocols
    Nabil, Mohamed
    Abouelseoud, Yasmine
    Elkobrosy, Galal
    Abdelrazek, Amr
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [37] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [38] A digital certificate-based lightweight authenticated protocol with key agreement for wireless network
    Jia, Qingxuan
    Gao, Panpan
    Gao, Xin
    X., Wang
    B., Zhao
    B., Cui
    Journal of Computational Information Systems, 2013, 9 (10): : 3817 - 3825
  • [39] An Efficient Certificate-Based Authenticated Key Agreement Protocol Without Bilinear Pairing
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    Shen, Jian
    INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (03): : 345 - 359
  • [40] A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks
    Luo, Ming
    Wen, Ying-You
    Zhao, Hong
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 3 - 10