Continuous after-the-fact leakage-resilient group password-authenticated key exchange

被引:0
|
作者
Ruan, Ou [1 ]
Wang, Zihao [1 ]
Wang, Qingping [1 ]
Zhang, Mingwu [1 ]
机构
[1] School of Computer Science, Hubei University of Technology, No.28, Nanli Road, Hongshan District, Wuhan City, Hubei Province, China
关键词
Authenticated key exchange - Cryptographic systems - Group key exchange protocols - Leakage-resilience - Leakage-resilient cryptographies - Partial information - Password-authenticated key exchange - Provable security;
D O I
10.6633/IJNS.20190921(5).19
中图分类号
学科分类号
摘要
During the past two decades, side-channel attacks have become a familiar method of attacking cryptographic systems, which allow an attacker to learn partial information about the internal secrets such as the secret key. A scheme that is secure in the traditional model will be vulnerable in the leakage environments, thus designing a strong, meaningful, and achievable security scheme to capture the practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we first formalize a continuous after-the-fact (AF) security model for leakage-resilient (LR) group password-authenticated key exchange (GPAKE) protocol, where the leakages are continuous and are allowed even after the adversary is given the challenges. Then, by combining Diffie-Hellman group key exchange protocol and Dziembowski-Faust leakageresilient storage scheme appropriately, we propose the first LR GPAKE protocol and present a formal security proof in the standard model. © 2019, International Journal of Network Security.
引用
收藏
页码:861 / 871
相关论文
共 50 条
  • [21] Leakage-resilient authenticated key establishment protocols
    Shin, SH
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 155 - 172
  • [22] More efficient password-authenticated key exchange
    MacKenzie, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 361 - 377
  • [23] Faster and shorter password-authenticated key exchange
    Gennaro, Rosario
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 589 - 606
  • [24] Password-authenticated key exchange based on RSA
    Philip MacKenzie
    Sarvar Patel
    Ram Swaminathan
    International Journal of Information Security, 2010, 9 : 387 - 410
  • [25] Parallelizable password-authenticated key exchange protocol
    Lee, SW
    Yoo, KY
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 1014 - 1019
  • [26] Password-authenticated key exchange based on RSA
    MacKenzie, P
    Patel, S
    Swaminathan, R
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 599 - 613
  • [27] Leakage-Resilient and Lightweight Authenticated Key Exchange for E-Health
    Zeng, Wenjun
    Zhang, Jie
    2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020), 2020, : 162 - 166
  • [28] Password-Authenticated Group Key Exchange: A Cross-Layer Design
    Zhang, Yuexin
    Xiang, Yang
    Huang, Xinyi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
  • [29] Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Tseng, Yuh-Min
    Chuang, Yun-Hsin
    Hung, Ying-Hao
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 137 - 148
  • [30] Hierarchical group password-authenticated key exchange based on bilinear pairing
    Liu, Xiu-Mei
    Gao, Ke-Ning
    Chang, Gui-Ran
    Tongxin Xuebao/Journal on Communications, 2010, 31 (06): : 44 - 48