Sciweavers

Share
CTRSA
2016
Springer

Strongly Leakage-Resilient Authenticated Key Exchange

3 years 24 days ago
Strongly Leakage-Resilient Authenticated Key Exchange
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK (CLR-eCK) model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key (i.e., randomness). Second, we propose a general framework for constructing one-round CLR-eCK-secure AKE protocols based on smooth projective hash functions (SPHFs). This framework ensures the session key is private and authentic even if the adversary learns a large fraction of both long-term secret key and ephemeral secret key, and hence provides stronger ...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu
Added 01 Apr 2016
Updated 01 Apr 2016
Type Journal
Year 2016
Where CTRSA
Authors Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
Comments (0)
books