Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

被引:13
|
作者
Wu, Jui-Di [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Cryptography; key agreement; authentication; leakage-resilience; generic bilinear group; SIGNATURE SCHEME; EXCHANGE; ENCRYPTION; CRYPTOGRAPHY; SECURE;
D O I
10.1109/ACCESS.2018.2799298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on users' permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (LR-AKA) resisting side-channel attacks has received significant attention from researchers. By side-channel attacks, an adversary is allowed to obtain fractional leakage information of private (secret) keys during the computation rounds of LR-AKA protocols. However, most LR-AKA protocols have a restriction, namely, the overall fractional leakage information must be bounded. In this paper, we propose an efficient LR-AKA protocol with overall unbounded leakage property in the continual leakage extended Canetti-Krawczyk model. Security analysis is given to demonstrate that our LR-AKA protocol is provably secure in the generic bilinear group model. By comparisons, our protocol is better than the previously proposed LR-AKA protocols in terms of computation cost, security model, and leakage properties.
引用
收藏
页码:17130 / 17142
页数:13
相关论文
共 50 条
  • [41] Implementation of a leakage-resilient ElGamal key encapsulation mechanism
    Galindo, David
    Grossschaedl, Johann
    Liu, Zhe
    Vadnala, Praveen Kumar
    Vivek, Srinivas
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 229 - 238
  • [42] RCB: leakage-resilient authenticated encryption via re-keying
    Megha Agrawal
    Tarun Kumar Bansal
    Donghoon Chang
    Amit Kumar Chauhan
    Seokhie Hong
    Jinkeon Kang
    Somitra Kumar Sanadhya
    The Journal of Supercomputing, 2018, 74 : 4173 - 4198
  • [43] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198
  • [44] Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
    Fujioka, Atsushi
    Suzuki, Koutarou
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 121 - 141
  • [45] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [46] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911
  • [47] Efficient Leakage-Resilient MACs Without Idealized Assumptions
    Berti, Francesco
    Guo, Chun
    Peters, Thomas
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 95 - 123
  • [48] Efficient leakage-resilient blind and partially blind signatures
    Dai, Shuguang
    Jiang, Zhengjun
    Zhang, Fangguo
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (01) : 52 - 61
  • [49] Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    Alwen, Joel
    Dodis, Yevgeniy
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 36 - 54
  • [50] Fully Leakage-Resilient Signatures
    Boyle, Elette
    Segev, Gil
    Wichs, Daniel
    JOURNAL OF CRYPTOLOGY, 2013, 26 (03) : 513 - 558