Standard model leakage-resilient authenticated key exchange using inner-product extractors

被引:0
作者
Janaka Alawatugoda
Tatsuaki Okamoto
机构
[1] University of Peradeniya,Department of Computer Engineering, Faculty of Engineering
[2] Griffith University,Institute for Integrated and Intelligent Systems
[3] NTT Research,Cryptography and Information Security Laboratories
[4] Inc.,undefined
来源
Designs, Codes and Cryptography | 2022年 / 90卷
关键词
Leakage-resilient cryptography; Authenticated key exchange; model; model; Standard model; 94A60; 94A62;
D O I
暂无
中图分类号
学科分类号
摘要
With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing authenticated key exchange protocols using existing cryptographic schemes is an effective method, as such construction can be instantiated with any appropriate scheme in a way that the formal security argument remains valid. In parallel, constructing authenticated key exchange protocols that are proven to be secure in the standard model is more preferred as they rely on real-world assumptions. In this paper, we present a Diffie–Hellman-style construction of a leakage-resilient authenticated key exchange protocol, that can be instantiated with any CCLA2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text {CCLA2}$$\end{document}-secure public-key encryption scheme and a function from the pseudo-random function family. Our protocol is proven to be secure in the standard model assuming the hardness of the decisional Diffie–Hellman problem. Furthermore, it is resilient to continuous partial leakage of long-term secret keys, that happens even after the session key is established, while satisfying the security features defined by the eCK\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text {eCK}$$\end{document} security model.
引用
收藏
页码:1059 / 1079
页数:20
相关论文
共 25 条
[1]  
Alawatugoda J(2017)Generic construction of an eck-secure key exchange protocol in the standard model Int. J. Inf. Secur. 16 541-557
[2]  
Alawatugoda J(2017)On the leakage-resilient key exchange J. Math. Cryptol. 11 215-269
[3]  
Alawatugoda J(2020)Public-key encryption in the standard model against strong leakage adversary Comput. J. 63 1904-1914
[4]  
Boneh D(2007)Chosen-ciphertext security from identity-based encryption SIAM J. Comput. 36 1301-1328
[5]  
Canetti R(2009)One-round key exchange in the standard model Int. J. Adv. Comput. Technol. 1 181-199
[6]  
Halevi S(2017)Strong authenticated key exchange with auxiliary inputs Des. Codes Cryptogr. 85 145-173
[7]  
Katz J(2002)Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 541-552
[8]  
Boyd C(2019)Strongly leakage resilient authenticated key exchange, revisited Des. Codes Cryptogr. 87 2885-2911
[9]  
Cliff Y(undefined)undefined undefined undefined undefined-undefined
[10]  
Nieto JMG(undefined)undefined undefined undefined undefined-undefined