Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol

被引:10
|
作者
Tsai, Tung-Tso [1 ]
Huang, Sen-Shan [2 ]
Tseng, Yuh-Min [2 ]
Chuang, Yun-Hsin [2 ]
Hung, Ying-Hao [3 ]
机构
[1] Natl Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
[2] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
[3] Natl Expt High Sch, Dept Math, Hsinchu Sci Pk, Hsinchu 300, Taiwan
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2022年 / 3卷
关键词
Authenticated key exchange; certificate-based cryptography; generic bilinear group; leakage-resilience; AGREEMENT PROTOCOL; SECURE; SCHEME; CRYPTOGRAPHY; ENCRYPTION;
D O I
10.1109/OJCS.2022.3198073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity-based public key systems. In the past, many authenticated key exchange (AKE) protocols based on CB-PKC systems, called CB-AKE, were proposed to be applied to secure communications between two remote participants. However, these existing CB-AKE protocols become insecure since attackers could compute and obtain the whole secret key from some partial leaked information of the secret key by side channel attacks. In this paper, our goal is to propose the first CB-AKE protocol with the property to resist side channel attacks, called leakage-resilient CB-AKE (LR-CB-AKE). The proposed LR-CB-AKE protocol is formally proven to be secure in the generic bilinear group (GBG) model under the discrete logarithm (DL) and computational Diffie-Hellman (CDH) assumptions.
引用
收藏
页码:137 / 148
页数:12
相关论文
共 50 条
  • [41] Continuous after-the-fact leakage-resilient group password-authenticated key exchange
    Ruan, Ou
    Wang, Zihao
    Wang, Qingping
    Zhang, Mingwu
    International Journal of Network Security, 2019, 21 (05) : 861 - 871
  • [42] Standard model leakage-resilient authenticated key exchange using inner-product extractors
    Alawatugoda, Janaka
    Okamoto, Tatsuaki
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (04) : 1059 - 1079
  • [43] Standard model leakage-resilient authenticated key exchange using inner-product extractors
    Janaka Alawatugoda
    Tatsuaki Okamoto
    Designs, Codes and Cryptography, 2022, 90 : 1059 - 1079
  • [45] Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 15 - 30
  • [46] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290
  • [47] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [48] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [49] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911
  • [50] Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
    Guo, Yuyan
    Li, Jiguo
    Jiang, Mingming
    Yu, Lei
    Wei, Shimin
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020