Continuous After-the-Fact Leakage-Resilient Key Exchange

被引:0
|
作者
Alawatugoda, Janaka [1 ]
Boyd, Colin [3 ]
Stebila, Douglas [1 ,2 ]
机构
[1] Queensland Univ Technol, Sch Elect Engn & Comp Sci, Brisbane, Qld 4001, Australia
[2] Queensland Univ Technol, Sch Math Sci, Brisbane, Qld, Australia
[3] Norwegian Univ Sci & Technol, Dept Telemat, Trondheim, Norway
关键词
leakage resilience; key exchange; continuous leakage; after-the-fact leakage; security models; CRYPTOGRAPHY; ATTACKS; SECURITY; POWER;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
引用
收藏
页码:258 / 273
页数:16
相关论文
共 50 条
  • [1] Continuous after-the-fact leakage-resilient group password-authenticated key exchange
    Ruan, Ou
    Wang, Zihao
    Wang, Qingping
    Zhang, Mingwu
    [J]. International Journal of Network Security, 2019, 21 (05): : 861 - 871
  • [2] After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Yuanyuan
    Zhang, Mingwu
    Zhou, Jing
    Harn, Lein
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2017 - 2026
  • [3] On security analysis of an after-the-fact leakage resilient key exchange protocol
    Yang, Zheng
    Li, Shuangqing
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (01) : 33 - 40
  • [4] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [5] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [6] After-the-Fact Leakage in Public-Key Encryption
    Halevi, Shai
    Lin, Huijia
    [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 107 - +
  • [7] Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, C. Pandu
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 167 - 187
  • [8] Leakage-Resilient Password-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Mingwu
    Chen, Jing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296
  • [9] Leakage-Resilient Key Exchange and Two-Seed Extractors
    Li, Xin
    Ma, Fermi
    Quach, Willy
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 401 - 429
  • [10] Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence
    Zhang, Jie
    Zhang, Futai
    Huang, Xin
    Liu, Xin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2835 - 2847