On the Privacy-Preserving Infrastructure for Authenticated Key Exchange

被引:0
|
作者
Duan, Li [1 ,2 ]
Li, Yong [2 ]
机构
[1] Paderborn Univ, Paderborn, Germany
[2] Huawei Technol Dusseldorf, Dusseldorf, Germany
来源
关键词
privacy; cryptographic protocols; public key infrastructure; formal model; privacy-preserving authenticated key exchange; ENCRYPTION;
D O I
10.1007/978-3-031-49187-0_22
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Privacy-preserving authenticated key exchange (PPAKE) protocols aim at providing both session key indistinguishability and party identifier hiding. Parties in PPAKEs usually interact with a public key infrastructure (PKI) or similar services for authentication, especially for validating certificates and other identity-binding tokens during the handshake. However, these essential validation messages, which have not been captured in current models, open attack surfaces for adversaries. In this paper, we propose a new refined infrastructure model (RI) for privacy in the infrastructure. As the cryptographic core, we also present a novel certificate validation protocol (CVP) that can be instantiated with anonymous Bloom filter key encapsulation mechanisms (ANO-BFKEM). The new CVP protects user identity in certificate validation, thus enhances the privacy guarantee of PPAKE.
引用
收藏
页码:435 / 454
页数:20
相关论文
共 50 条
  • [31] Privacy-preserving grouping proof with key exchange in the multiple-party setting
    Tian, Yangguang
    Yang, Guomin
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3239 - 3250
  • [32] Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting
    Yangguang Tian
    Guomin Yang
    Yi Mu
    Wireless Personal Communications, 2017, 94 : 1017 - 1034
  • [33] Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks
    Lu, Yanrong
    Xu, Guangquan
    Li, Lixiang
    Yang, Yixian
    IEEE SYSTEMS JOURNAL, 2019, 13 (02): : 1454 - 1465
  • [34] Prioritization and exchange chains in privacy-preserving kidney exchange
    Breuer, Malte
    Hein, Pascal
    Pompe, Leonardo
    Meyer, Urike
    Wetzel, Susanne
    JOURNAL OF COMPUTER SECURITY, 2024, 32 (04) : 349 - 404
  • [35] A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
    Abdel-Rahman, Adam Oumar
    Levillain, Olivier
    Totel, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 185 - 199
  • [36] SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange
    Xie, Haomeng
    Yan, Zheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4404 - 4417
  • [37] An Efficient Overlay Infrastructure for Privacy-Preserving Communication on the Internet
    Al-Muhtadi, Jalal
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2007, 19 : 39 - 59
  • [38] Privacy-Preserving Production Process Parameter Exchange
    Pennekamp, Jan
    Buchholz, Erik
    Lockner, Yannik
    Dahlmanns, Markus
    Xi, Tiandong
    Fey, Marcel
    Brecher, Christian
    Hopmann, Christian
    Wehrle, Klaus
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 510 - 525
  • [39] Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange
    Breuer, Malte
    Meyer, Ulrike
    Wetzel, Susanne
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 53 - 64
  • [40] Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System
    Tu, Jun
    Shen, Gang
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2023, 2024, 2004 : 38 - 57