Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage

被引:0
|
作者
Fujioka, Atsushi [1 ]
Suzuki, Koutarou [1 ]
Yoneyama, Kazuki [1 ]
机构
[1] NTT Informat Sharing Platform Labs, Musashino, Tokyo 1808585, Japan
来源
关键词
predicate-based AKE; eCK security; ENCRYPTION; PROTOCOLS; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide the first eCK security model for predicate-based authenticated key exchange (AKE) to guarantee resistance to leakage of ephemeral secret keys. We also propose an two-pass attribute-based AKE protocol secure in the proposed predicate-based eCK security model based on a attribute-based encryption. The proposed protocol has advantages in security against leakage of ephemeral secret keys and the round complexity compared to the previous predicate-based AKE protocol.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 50 条
  • [1] Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1306 - 1317
  • [2] Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 164 - 180
  • [3] Predicate-Based Key Exchange
    Birkett, James
    Stebila, Douglas
    [J]. INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 282 - 299
  • [4] Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 40 - 56
  • [5] Predicate-based authenticated key exchange protocol with attribute-hiding
    Liu, Wen-Fen
    Wei, Jiang-Hong
    Hu, Xue-Xian
    [J]. Tongxin Xuebao/Journal on Communications, 2012, 33 (SUPPL.1): : 41 - 47
  • [6] Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys
    Fujioka, Atsushi
    Suzuki, Koutarou
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 121 - 141
  • [7] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [8] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [9] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [10] Strongly leakage resilient authenticated key exchange, revisited
    Yang, Guomin
    Chen, Rongmao
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Li, Jie
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (12) : 2885 - 2911