Continuous After-the-Fact Leakage-Resilient Key Exchange

被引:0
作者
Alawatugoda, Janaka [1 ]
Boyd, Colin [3 ]
Stebila, Douglas [1 ,2 ]
机构
[1] Queensland Univ Technol, Sch Elect Engn & Comp Sci, Brisbane, Qld 4001, Australia
[2] Queensland Univ Technol, Sch Math Sci, Brisbane, Qld, Australia
[3] Norwegian Univ Sci & Technol, Dept Telemat, Trondheim, Norway
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2014 | 2014年 / 8544卷
关键词
leakage resilience; key exchange; continuous leakage; after-the-fact leakage; security models; CRYPTOGRAPHY; ATTACKS; SECURITY; POWER;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
引用
收藏
页码:258 / 273
页数:16
相关论文
共 27 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Alawatugoda J., 2014, 2014264 IACR CRYPT E
[3]  
Alawatugoda J., 2014, 2014131 IACR CRYPT E
[4]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[5]  
[Anonymous], 2005, TECHNICAL REPORT
[6]  
[Anonymous], LNCS
[7]  
[Anonymous], 2011, RENEW ENERGY POWER Q, DOI DOI 10.24084/REPQJ09.355
[8]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[9]  
Boyd Colin, 2009, International Journal of Applied Cryptography, V1, P181, DOI 10.1504/IJACT.2009.023466
[10]  
Brakerski Z., 2010, 2010278 IACR CRYPT E