Strong authenticated key exchange with auxiliary inputs
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7371 https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8374 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83742022-10-13T07:46:55Z Strong authenticated key exchange with auxiliary inputs CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we revisit the modelling and design of authenticated key exchange (AKE) protocols with leakage resilience. We show that the prior works on this topic are inadequate in capturing realistic leakage attacks. To close this research gap, we propose a new security notion named leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK) for AKE protocols, which addresses the limitations of the previous models. Our model allows computationally hard-to-invert leakage of both the long-term secret key and the randomness, and also addresses a limitation existing in most of the previous models where the adversary is disallowed to make leakage queries during the challenge session. As another major contribution of this work, we present a generic framework for the construction of AKE protocols that are secure under the proposed AI-LR-eCK model. An instantiation based on the decision Diffie–Hellman (DDH) assumption in the standard model is also given to demonstrate the feasibility of our proposed framework. 2017-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7371 info:doi/10.1007/s10623-016-0295-3 https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated key exchange Auxiliary input Smooth projective hash functions Strong randomness extractor Twisted pseudo-random function Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Authenticated key exchange Auxiliary input Smooth projective hash functions Strong randomness extractor Twisted pseudo-random function Information Security |
spellingShingle |
Authenticated key exchange Auxiliary input Smooth projective hash functions Strong randomness extractor Twisted pseudo-random function Information Security CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun Strong authenticated key exchange with auxiliary inputs |
description |
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we revisit the modelling and design of authenticated key exchange (AKE) protocols with leakage resilience. We show that the prior works on this topic are inadequate in capturing realistic leakage attacks. To close this research gap, we propose a new security notion named leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK) for AKE protocols, which addresses the limitations of the previous models. Our model allows computationally hard-to-invert leakage of both the long-term secret key and the randomness, and also addresses a limitation existing in most of the previous models where the adversary is disallowed to make leakage queries during the challenge session. As another major contribution of this work, we present a generic framework for the construction of AKE protocols that are secure under the proposed AI-LR-eCK model. An instantiation based on the decision Diffie–Hellman (DDH) assumption in the standard model is also given to demonstrate the feasibility of our proposed framework. |
format |
text |
author |
CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun |
author_facet |
CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun |
author_sort |
CHEN, Rongmao |
title |
Strong authenticated key exchange with auxiliary inputs |
title_short |
Strong authenticated key exchange with auxiliary inputs |
title_full |
Strong authenticated key exchange with auxiliary inputs |
title_fullStr |
Strong authenticated key exchange with auxiliary inputs |
title_full_unstemmed |
Strong authenticated key exchange with auxiliary inputs |
title_sort |
strong authenticated key exchange with auxiliary inputs |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/7371 https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf |
_version_ |
1770576320645824512 |