Continuous after-the-fact leakage-resilient group password-authenticated key exchange

被引:0
|
作者
Ruan, Ou [1 ]
Wang, Zihao [1 ]
Wang, Qingping [1 ]
Zhang, Mingwu [1 ]
机构
[1] School of Computer Science, Hubei University of Technology, No.28, Nanli Road, Hongshan District, Wuhan City, Hubei Province, China
来源
关键词
Network security - Authentication;
D O I
10.6633/IJNS.20190921(5).19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the past two decades, side-channel attacks have become a familiar method of attacking cryptographic systems, which allow an attacker to learn partial information about the internal secrets such as the secret key. A scheme that is secure in the traditional model will be vulnerable in the leakage environments, thus designing a strong, meaningful, and achievable security scheme to capture the practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we first formalize a continuous after-the-fact (AF) security model for leakage-resilient (LR) group password-authenticated key exchange (GPAKE) protocol, where the leakages are continuous and are allowed even after the adversary is given the challenges. Then, by combining Diffie-Hellman group key exchange protocol and Dziembowski-Faust leakageresilient storage scheme appropriately, we propose the first LR GPAKE protocol and present a formal security proof in the standard model. © 2019, International Journal of Network Security.
引用
收藏
页码:861 / 871
相关论文
共 50 条
  • [1] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
  • [2] After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Yuanyuan
    Zhang, Mingwu
    Zhou, Jing
    Harn, Lein
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2017 - 2026
  • [3] Leakage-Resilient Password-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Mingwu
    Chen, Jing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296
  • [4] An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol
    Ruan, Ou
    Yang, Yang
    Zhang, Mingwu
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 665 - 674
  • [5] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [6] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [7] Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model
    Ruan, Ou
    Chen, Jing
    Zhang, Mingwu
    [J]. IEEE ACCESS, 2017, 5 : 26832 - 26841
  • [8] On security analysis of an after-the-fact leakage resilient key exchange protocol
    Yang, Zheng
    Li, Shuangqing
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (01) : 33 - 40
  • [9] Password-Authenticated Key Exchange from Group Actions
    Abdalla, Michel
    Eisenhofer, Thorsten
    Kiltz, Eike
    Kunzweiler, Sabrina
    Riepel, Doreen
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 699 - 728
  • [10] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173