Continuous after-the-fact leakage-resilient group password-authenticated key exchange

被引:0
|
作者
Ruan, Ou [1 ]
Wang, Zihao [1 ]
Wang, Qingping [1 ]
Zhang, Mingwu [1 ]
机构
[1] School of Computer Science, Hubei University of Technology, No.28, Nanli Road, Hongshan District, Wuhan City, Hubei Province, China
关键词
Authenticated key exchange - Cryptographic systems - Group key exchange protocols - Leakage-resilience - Leakage-resilient cryptographies - Partial information - Password-authenticated key exchange - Provable security;
D O I
10.6633/IJNS.20190921(5).19
中图分类号
学科分类号
摘要
During the past two decades, side-channel attacks have become a familiar method of attacking cryptographic systems, which allow an attacker to learn partial information about the internal secrets such as the secret key. A scheme that is secure in the traditional model will be vulnerable in the leakage environments, thus designing a strong, meaningful, and achievable security scheme to capture the practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we first formalize a continuous after-the-fact (AF) security model for leakage-resilient (LR) group password-authenticated key exchange (GPAKE) protocol, where the leakages are continuous and are allowed even after the adversary is given the challenges. Then, by combining Diffie-Hellman group key exchange protocol and Dziembowski-Faust leakageresilient storage scheme appropriately, we propose the first LR GPAKE protocol and present a formal security proof in the standard model. © 2019, International Journal of Network Security.
引用
收藏
页码:861 / 871
相关论文
共 50 条
  • [11] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [12] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [13] Fuzzy Password-Authenticated Key Exchange
    Dupont, Pierre-Alain
    Hesse, Julia
    Pointcheval, David
    Reyzin, Leonid
    Yakoubov, Sophia
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 393 - 424
  • [14] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    Journal of Cryptology, 2006, 19 : 27 - 66
  • [15] Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence
    Zhang, Jie
    Zhang, Futai
    Huang, Xin
    Liu, Xin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2835 - 2847
  • [16] Contributory Password-Authenticated Group Key Exchange with Join Capability
    Abdalla, Michel
    Chevalier, Celine
    Granboulan, Louis
    Pointcheval, David
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 142 - +
  • [17] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167
  • [18] ID-Based Group Password-Authenticated Key Exchange
    Yi, Xun
    Tso, Raylin
    Okamoto, Eijo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 192 - +
  • [19] Password-authenticated key exchange based on RSA
    MacKenzie, Philip
    Patel, Sarvar
    Swaminathan, Ram
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) : 387 - 410
  • [20] UC-secure and Contributory Password-Authenticated Group Key Exchange
    Zhang, Lin
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 119 - 134