A simple leakage-resilient Authenticated Key Establishment protocol, its extensions, and applications

被引:10
|
作者
Shin, S [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
entropy of passwords; on-line and off-line attacks; authentication; key establishment protocol; leakage of stored secrets; proactive security; DDH problem; standard model;
D O I
10.1093/ietfec/e88-a.3.736
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we review the previous AKE protocols, all of which turn out to be insecure, under the following realistic assumptions: (1) High-entropy secrets that should be stored on devices may leak out due to accidents such as bugs or mis-configureations of the system; (2) The size of human-memorable secret, i.e. password, is short enough to memorize, but large enough to avoid on-line exhaustive search; (3) TRM (Tamper-Resistant Modules) used to store secrets are not perfectly free from bugs and mis-configurations; (4) A client remembers only one password, even if he/she communicates with several different servers. Then, we propose a simple leakage-resilient AKE protocol (cf. [41]) which is described as follows: the client keeps one password in mind and stores one secret value on devices, both of which are used to establish an authenticated session key with the server. The advantages of leakage-resilient AKEs to the previous AKEs are that the former is secure against active adversaries under the above-mentioned assumptions and has immunity to the leakage of stored secrets from a client and a server (or servers), respectively. In addition, the advantage of the proposed protocol to [41] is the reduction of memory size of the client's secrets. And we extend our protocol to be possible for updating secret values registered in server(s) or password remembered by a client. Some applications and the formal security proof in the standard model of our protocol are also provided.
引用
收藏
页码:736 / 754
页数:19
相关论文
共 50 条
  • [31] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198
  • [32] Implementation of a leakage-resilient ElGamal key encapsulation mechanism
    Galindo, David
    Grossschaedl, Johann
    Liu, Zhe
    Vadnala, Praveen Kumar
    Vivek, Srinivas
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 229 - 238
  • [33] Leakage-Resilient Storage Scheme for Cryptographic Applications
    Alawatugoda, Janaka
    Ragel, Roshan
    Eranga, Danushka
    Jayanath, Nalaka
    Somathilaka, Chinthaka
    2016 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION FOR SUSTAINABILITY (ICIAFS): INTEROPERABLE SUSTAINABLE SMART SYSTEMS FOR NEXT GENERATION, 2016,
  • [34] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [35] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911
  • [36] Regular lossy functions and their applications in leakage-resilient cryptography
    Chen, Yu
    Qin, Baodong
    Xue, Haiyang
    THEORETICAL COMPUTER SCIENCE, 2018, 739 : 13 - 38
  • [37] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
  • [38] Leakage-Resilient Key Exchange and Two-Seed Extractors
    Li, Xin
    Ma, Fermi
    Quach, Willy
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 401 - 429
  • [39] Leakage-Resilient Public-Key Encryption from Obfuscation
    Dachman-Soled, Dana
    Gordon, S. Dov
    Liu, Feng-Hao
    O'Neill, Adam
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 101 - 128
  • [40] Continual Leakage-Resilient Hedged Public-Key Encryption
    Huang, Meijuan
    Yang, Bo
    Zhou, Yanwei
    Hu, Xuewei
    COMPUTER JOURNAL, 2022, 65 (06): : 1574 - 1585