A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

被引:10
|
作者
Hsieh, Tsung-Che [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Key exchange; key agreement; authentication; leakage-resilience; side-channel attacks; IDENTITY-BASED ENCRYPTION; AGREEMENT PROTOCOL; SIGNATURE SCHEME; SECURE; ENCAPSULATION; CRYPTOGRAPHY;
D O I
10.1109/ACCESS.2020.3006841
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE) protocol is an important primitive of the certificateless public-key cryptography. A CLAKE protocol is employed to provide both mutual authentication and establishing a session key between two participators. Indeed, all conventional public-key cryptographies have encountered a new kind of attack, named "side-channel attacks". Fortunately, leakage-resilient cryptography is a flexible approach to withstand such attacks. However, the design of leakage-resilient CLAKE (LR-CLAKE) protocols is not studied. In the article, by extending the well-known extended-Canetti-Krawczyk (eCK) model, we present the security notions (adversary model) of LR-CLAKE protocols, called continual-leakage-resilient eCK (CLReCK) model. The first LR-CLAKE protocol withstanding side-channel attacks is proposed. By employing the proof technique of the generic bilinear group (GBG) model, we formally prove the security of our protocol in the CLReCK model.
引用
收藏
页码:121795 / 121810
页数:16
相关论文
共 50 条
  • [31] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [32] Standard model leakage-resilient authenticated key exchange using inner-product extractors
    Janaka Alawatugoda
    Tatsuaki Okamoto
    [J]. Designs, Codes and Cryptography, 2022, 90 : 1059 - 1079
  • [33] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [34] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [35] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911
  • [36] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273
  • [37] Leakage-Resilient Key Exchange and Two-Seed Extractors
    Li, Xin
    Ma, Fermi
    Quach, Willy
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 401 - 429
  • [38] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 (04) : 481 - 493
  • [39] Authenticated Encryption in the Face of Protocol and Side Channel Leakage
    Barwell, Guy
    Martin, Daniel P.
    Oswald, Elisabeth
    Stam, Martijn
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 693 - 723
  • [40] Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 15 - 30