Efficient and leakage-resilient authenticated key transport protocol based on RSA

被引:0
|
作者
Shin, SH [1 ]
Kobara, K [1 ]
Imai, H [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Minato Ku, Tokyo 1538505, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Let us consider the following situation: (1) a client, who communicates with a variety of servers, remembers only one password and has insecure devices with very-restricted computing power and built-in memory capacity; (2) the counterpart servers have enormous computing power, but they are not perfectly secure; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper-Resistant Modules) is available. Our main goal of this paper is to provide its security against the leakage of stored secrets as well as to attain high efficiency on client's side. For those, we propose an efficient and leakage-resilient RSA-based Authenticated Key Establishment (RSA-AKE) protocol suitable for the above situation whose authenticity is based on password and an additional stored secret. The RSA-AKE protocol is provably secure in the random oracle model where an adversary is given the stored secret of client and the RSA private key of server. In terms of computation costs, the client is required to compute only one modular exponentiation with an exponent e (e >= 3) in the protocol execution. We also show that the RSA-AKE protocol has several security properties and efficiency over the previous ones of their kinds.
引用
收藏
页码:269 / 284
页数:16
相关论文
共 50 条
  • [41] TEDT2-Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption
    List, Eik
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021, 2021, 12912 : 275 - 295
  • [42] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290
  • [43] Weakness in a RSA-based password authenticated key exchange protocol
    Youn, Taek-Young
    Park, Young-Ho
    Kim, Changhan
    Lim, Jongin
    INFORMATION PROCESSING LETTERS, 2008, 108 (06) : 339 - 342
  • [44] Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1306 - 1317
  • [45] Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 164 - 180
  • [46] Efficient Leakage-Resilient MACs Without Idealized Assumptions
    Berti, Francesco
    Guo, Chun
    Peters, Thomas
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 95 - 123
  • [47] Efficient leakage-resilient blind and partially blind signatures
    Dai, Shuguang
    Jiang, Zhengjun
    Zhang, Fangguo
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (01) : 52 - 61
  • [48] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [49] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911
  • [50] Continuous After-the-Fact Leakage-Resilient Key Exchange
    Alawatugoda, Janaka
    Boyd, Colin
    Stebila, Douglas
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 258 - 273