Efficient and leakage-resilient authenticated key transport protocol based on RSA

被引:0
|
作者
Shin, SH [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Minato Ku, Tokyo 1538505, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Let us consider the following situation: (1) a client, who communicates with a variety of servers, remembers only one password and has insecure devices with very-restricted computing power and built-in memory capacity; (2) the counterpart servers have enormous computing power, but they are not perfectly secure; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper-Resistant Modules) is available. Our main goal of this paper is to provide its security against the leakage of stored secrets as well as to attain high efficiency on client's side. For those, we propose an efficient and leakage-resilient RSA-based Authenticated Key Establishment (RSA-AKE) protocol suitable for the above situation whose authenticity is based on password and an additional stored secret. The RSA-AKE protocol is provably secure in the random oracle model where an adversary is given the stored secret of client and the RSA private key of server. In terms of computation costs, the client is required to compute only one modular exponentiation with an exponent e (e >= 3) in the protocol execution. We also show that the RSA-AKE protocol has several security properties and efficiency over the previous ones of their kinds.
引用
收藏
页码:269 / 284
页数:16
相关论文
共 50 条
  • [31] Security of a leakage-resilient protocol for key establishment and mutual authentication (Extended abstract)
    Phan, Raphael C. -W.
    Choo, Kim-Kwang Raymond
    Heng, Swee-Huay
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 169 - +
  • [32] RCB: leakage-resilient authenticated encryption via re-keying
    Megha Agrawal
    Tarun Kumar Bansal
    Donghoon Chang
    Amit Kumar Chauhan
    Seokhie Hong
    Jinkeon Kang
    Somitra Kumar Sanadhya
    The Journal of Supercomputing, 2018, 74 : 4173 - 4198
  • [33] RCB: leakage-resilient authenticated encryption via re-keying
    Agrawal, Megha
    Bansal, Tarun Kumar
    Chang, Donghoon
    Chauhan, Amit Kumar
    Hong, Seokhie
    Kang, Jinkeon
    Sanadhya, Somitra Kumar
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198
  • [34] Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 131 - 144
  • [35] Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 15 - 30
  • [36] Implementation of a leakage-resilient ElGamal key encapsulation mechanism
    Galindo, David
    Grossschaedl, Johann
    Liu, Zhe
    Vadnala, Praveen Kumar
    Vivek, Srinivas
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 229 - 238
  • [37] A Leakage-Resilient FPGA-based IP Identity Authentication Protocol
    Long, Jing
    Zhang, Dafang
    Liang, Wei
    Li, Kuan-Ching
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 287 - 292
  • [38] Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
    Fujioka, Atsushi
    Suzuki, Koutarou
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 121 - 141
  • [39] Efficient password-authenticated key exchange based on RSA
    Park, Sangjoon
    Nam, Junghyun
    Kim, Seungjoo
    Won, Dongho
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 309 - +
  • [40] More efficient password authenticated key exchange based on RSA
    Wong, DS
    Chan, AH
    Zhu, F
    PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 375 - 387