Strong authenticated key exchange with auxiliary inputs

Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage...

Full description

Saved in:
Bibliographic Details
Main Authors: CHEN, Rongmao, MU, Yi, YANG, Guomin, SUSILO, Willy, GUO, Fuchun
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7371
https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8374
record_format dspace
spelling sg-smu-ink.sis_research-83742022-10-13T07:46:55Z Strong authenticated key exchange with auxiliary inputs CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we revisit the modelling and design of authenticated key exchange (AKE) protocols with leakage resilience. We show that the prior works on this topic are inadequate in capturing realistic leakage attacks. To close this research gap, we propose a new security notion named leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK) for AKE protocols, which addresses the limitations of the previous models. Our model allows computationally hard-to-invert leakage of both the long-term secret key and the randomness, and also addresses a limitation existing in most of the previous models where the adversary is disallowed to make leakage queries during the challenge session. As another major contribution of this work, we present a generic framework for the construction of AKE protocols that are secure under the proposed AI-LR-eCK model. An instantiation based on the decision Diffie–Hellman (DDH) assumption in the standard model is also given to demonstrate the feasibility of our proposed framework. 2017-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7371 info:doi/10.1007/s10623-016-0295-3 https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated key exchange Auxiliary input Smooth projective hash functions Strong randomness extractor Twisted pseudo-random function Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Authenticated key exchange
Auxiliary input
Smooth projective hash functions
Strong randomness extractor
Twisted pseudo-random function
Information Security
spellingShingle Authenticated key exchange
Auxiliary input
Smooth projective hash functions
Strong randomness extractor
Twisted pseudo-random function
Information Security
CHEN, Rongmao
MU, Yi
YANG, Guomin
SUSILO, Willy
GUO, Fuchun
Strong authenticated key exchange with auxiliary inputs
description Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we revisit the modelling and design of authenticated key exchange (AKE) protocols with leakage resilience. We show that the prior works on this topic are inadequate in capturing realistic leakage attacks. To close this research gap, we propose a new security notion named leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK) for AKE protocols, which addresses the limitations of the previous models. Our model allows computationally hard-to-invert leakage of both the long-term secret key and the randomness, and also addresses a limitation existing in most of the previous models where the adversary is disallowed to make leakage queries during the challenge session. As another major contribution of this work, we present a generic framework for the construction of AKE protocols that are secure under the proposed AI-LR-eCK model. An instantiation based on the decision Diffie–Hellman (DDH) assumption in the standard model is also given to demonstrate the feasibility of our proposed framework.
format text
author CHEN, Rongmao
MU, Yi
YANG, Guomin
SUSILO, Willy
GUO, Fuchun
author_facet CHEN, Rongmao
MU, Yi
YANG, Guomin
SUSILO, Willy
GUO, Fuchun
author_sort CHEN, Rongmao
title Strong authenticated key exchange with auxiliary inputs
title_short Strong authenticated key exchange with auxiliary inputs
title_full Strong authenticated key exchange with auxiliary inputs
title_fullStr Strong authenticated key exchange with auxiliary inputs
title_full_unstemmed Strong authenticated key exchange with auxiliary inputs
title_sort strong authenticated key exchange with auxiliary inputs
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/7371
https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf
_version_ 1770576320645824512