Continuous after-the-fact leakage-resilient group password-authenticated key exchange

被引:0
|
作者
Ruan, Ou [1 ]
Wang, Zihao [1 ]
Wang, Qingping [1 ]
Zhang, Mingwu [1 ]
机构
[1] School of Computer Science, Hubei University of Technology, No.28, Nanli Road, Hongshan District, Wuhan City, Hubei Province, China
关键词
Authenticated key exchange - Cryptographic systems - Group key exchange protocols - Leakage-resilience - Leakage-resilient cryptographies - Partial information - Password-authenticated key exchange - Provable security;
D O I
10.6633/IJNS.20190921(5).19
中图分类号
学科分类号
摘要
During the past two decades, side-channel attacks have become a familiar method of attacking cryptographic systems, which allow an attacker to learn partial information about the internal secrets such as the secret key. A scheme that is secure in the traditional model will be vulnerable in the leakage environments, thus designing a strong, meaningful, and achievable security scheme to capture the practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we first formalize a continuous after-the-fact (AF) security model for leakage-resilient (LR) group password-authenticated key exchange (GPAKE) protocol, where the leakages are continuous and are allowed even after the adversary is given the challenges. Then, by combining Diffie-Hellman group key exchange protocol and Dziembowski-Faust leakageresilient storage scheme appropriately, we propose the first LR GPAKE protocol and present a formal security proof in the standard model. © 2019, International Journal of Network Security.
引用
收藏
页码:861 / 871
相关论文
共 50 条
  • [41] Owl: An Augmented Password-Authenticated Key Exchange Scheme
    Hao, Feng
    Bag, Samiran
    Chen, Liqun
    van Oorschot, Paul C.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 227 - 244
  • [42] A general compiler for password-authenticated group key exchange protocol in the standard model
    Wei, Fushan
    Kumar, Neeraj
    He, Debiao
    Yeo, Sang-Soo
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 78 - 86
  • [43] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [44] Research on password-authenticated key exchange protocol over lattices
    Guo Y.
    Yin A.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187
  • [45] A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism
    Tsai, Tung-Tso
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Hung, Ying-Hao
    IEEE ACCESS, 2021, 9 : 128633 - 128647
  • [46] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [47] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151
  • [48] Cryptanalysis of some improved password-authenticated key exchange schemes
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Wong, Kah-Hoong
    COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2822 - 2829
  • [49] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [50] The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols
    Eaton, Edward
    Stebila, Douglas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 154 - 173