Efficient and leakage-resilient authenticated key transport protocol based on RSA

被引:0
|
作者
Shin, SH [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Minato Ku, Tokyo 1538505, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Let us consider the following situation: (1) a client, who communicates with a variety of servers, remembers only one password and has insecure devices with very-restricted computing power and built-in memory capacity; (2) the counterpart servers have enormous computing power, but they are not perfectly secure; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper-Resistant Modules) is available. Our main goal of this paper is to provide its security against the leakage of stored secrets as well as to attain high efficiency on client's side. For those, we propose an efficient and leakage-resilient RSA-based Authenticated Key Establishment (RSA-AKE) protocol suitable for the above situation whose authenticity is based on password and an additional stored secret. The RSA-AKE protocol is provably secure in the random oracle model where an adversary is given the stored secret of client and the RSA private key of server. In terms of computation costs, the client is required to compute only one modular exponentiation with an exponent e (e >= 3) in the protocol execution. We also show that the RSA-AKE protocol has several security properties and efficiency over the previous ones of their kinds.
引用
收藏
页码:269 / 284
页数:16
相关论文
共 50 条
  • [21] Leakage-resilient and proactive authenticated key exchange (LRP-AKE), reconsidered
    Shin S.
    Shin, SeongHan (seonghan.shin@aist.go.jp), 1880, Institute of Electronics Information Communication Engineers (104): : 1880 - 1893
  • [22] Provably leakage-resilient three-party password-based authenticated key exchange
    Ruan, Ou
    Wang, Qingping
    Wang, Zihao
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 163 - 173
  • [23] Provably leakage-resilient three-party password-based authenticated key exchange
    Ou Ruan
    Qingping Wang
    Zihao Wang
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
  • [24] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [25] Continuous after-the-fact leakage-resilient group password-authenticated key exchange
    Ruan, Ou
    Wang, Zihao
    Wang, Qingping
    Zhang, Mingwu
    International Journal of Network Security, 2019, 21 (05) : 861 - 871
  • [26] Efficient leakage-resilient public key encryption from DDH assumption
    Sujuan Li
    Futai Zhang
    Yinxia Sun
    Limin Shen
    Cluster Computing, 2013, 16 : 797 - 806
  • [27] Standard model leakage-resilient authenticated key exchange using inner-product extractors
    Alawatugoda, Janaka
    Okamoto, Tatsuaki
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (04) : 1059 - 1079
  • [28] Efficient leakage-resilient public key encryption from DDH assumption
    Li, Sujuan
    Zhang, Futai
    Sun, Yinxia
    Shen, Limin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
  • [29] Standard model leakage-resilient authenticated key exchange using inner-product extractors
    Janaka Alawatugoda
    Tatsuaki Okamoto
    Designs, Codes and Cryptography, 2022, 90 : 1059 - 1079
  • [30] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155