Leakage resilient authenticated key exchange secure in the auxiliary input model

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been pro...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, MU, Yi, SUSILO, Willy, WONG, Duncan S.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7379
https://ink.library.smu.edu.sg/context/sis_research/article/8382/viewcontent/Leakage_resilient_authenticated_key_exchange_secure_in_the_auxiliary_input_model.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8382
record_format dspace
spelling sg-smu-ink.sis_research-83822022-10-13T07:35:54Z Leakage resilient authenticated key exchange secure in the auxiliary input model YANG, Guomin MU, Yi SUSILO, Willy WONG, Duncan S. Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resilient AKE in the auxiliary input model. A promising way to construct such a protocol is to use a digital signature scheme that is entropically-unforgeable under chosen message and auxiliary input attacks. However, to date we are not aware of any digital signature scheme that can satisfy this requirement. On the other hand, we show that in the random oracle model, it is sufficient to use a digital signature scheme that is secure under random message and auxiliary input attacks in order to build a secure AKE protocol in the auxiliary input model, while the existence of such a digital signature scheme has already been proven. We will also give a comparison between the existing public-key encryption based and digital signature based leakage resilient AKE protocols. We show that the latter can provide a higher level of security than the former. 2013-05-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7379 info:doi/10.1007/978-3-642-38033-4_15 https://ink.library.smu.edu.sg/context/sis_research/article/8382/viewcontent/Leakage_resilient_authenticated_key_exchange_secure_in_the_auxiliary_input_model.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University authenticated key exchange; auxiliary input model Leakage resilient cryptography Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic authenticated key exchange; auxiliary input model
Leakage resilient cryptography
Information Security
spellingShingle authenticated key exchange; auxiliary input model
Leakage resilient cryptography
Information Security
YANG, Guomin
MU, Yi
SUSILO, Willy
WONG, Duncan S.
Leakage resilient authenticated key exchange secure in the auxiliary input model
description Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resilient AKE in the auxiliary input model. A promising way to construct such a protocol is to use a digital signature scheme that is entropically-unforgeable under chosen message and auxiliary input attacks. However, to date we are not aware of any digital signature scheme that can satisfy this requirement. On the other hand, we show that in the random oracle model, it is sufficient to use a digital signature scheme that is secure under random message and auxiliary input attacks in order to build a secure AKE protocol in the auxiliary input model, while the existence of such a digital signature scheme has already been proven. We will also give a comparison between the existing public-key encryption based and digital signature based leakage resilient AKE protocols. We show that the latter can provide a higher level of security than the former.
format text
author YANG, Guomin
MU, Yi
SUSILO, Willy
WONG, Duncan S.
author_facet YANG, Guomin
MU, Yi
SUSILO, Willy
WONG, Duncan S.
author_sort YANG, Guomin
title Leakage resilient authenticated key exchange secure in the auxiliary input model
title_short Leakage resilient authenticated key exchange secure in the auxiliary input model
title_full Leakage resilient authenticated key exchange secure in the auxiliary input model
title_fullStr Leakage resilient authenticated key exchange secure in the auxiliary input model
title_full_unstemmed Leakage resilient authenticated key exchange secure in the auxiliary input model
title_sort leakage resilient authenticated key exchange secure in the auxiliary input model
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/7379
https://ink.library.smu.edu.sg/context/sis_research/article/8382/viewcontent/Leakage_resilient_authenticated_key_exchange_secure_in_the_auxiliary_input_model.pdf
_version_ 1770576327786627072