A simple leakage-resilient Authenticated Key Establishment protocol, its extensions, and applications

被引:10
|
作者
Shin, S [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
entropy of passwords; on-line and off-line attacks; authentication; key establishment protocol; leakage of stored secrets; proactive security; DDH problem; standard model;
D O I
10.1093/ietfec/e88-a.3.736
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we review the previous AKE protocols, all of which turn out to be insecure, under the following realistic assumptions: (1) High-entropy secrets that should be stored on devices may leak out due to accidents such as bugs or mis-configureations of the system; (2) The size of human-memorable secret, i.e. password, is short enough to memorize, but large enough to avoid on-line exhaustive search; (3) TRM (Tamper-Resistant Modules) used to store secrets are not perfectly free from bugs and mis-configurations; (4) A client remembers only one password, even if he/she communicates with several different servers. Then, we propose a simple leakage-resilient AKE protocol (cf. [41]) which is described as follows: the client keeps one password in mind and stores one secret value on devices, both of which are used to establish an authenticated session key with the server. The advantages of leakage-resilient AKEs to the previous AKEs are that the former is secure against active adversaries under the above-mentioned assumptions and has immunity to the leakage of stored secrets from a client and a server (or servers), respectively. In addition, the advantage of the proposed protocol to [41] is the reduction of memory size of the client's secrets. And we extend our protocol to be possible for updating secret values registered in server(s) or password remembered by a client. Some applications and the formal security proof in the standard model of our protocol are also provided.
引用
收藏
页码:736 / 754
页数:19
相关论文
共 50 条
  • [1] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [2] An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol
    Ruan, Ou
    Yang, Yang
    Zhang, Mingwu
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 665 - 674
  • [3] An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (06) : 1086 - 1101
  • [4] Efficient and leakage-resilient authenticated key transport protocol based on RSA
    Shin, SH
    Kobara, K
    Imai, H
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 269 - 284
  • [5] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [6] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [7] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [8] Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2018, 6 : 17130 - 17142
  • [9] A simplified leakage-resilient authenticated key exchange protocol with optimal memory size
    Shin, S
    Kobara, K
    Imai, H
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 944 - 952
  • [10] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices
    Peng, An-Li
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5343 - 5354