Strongly leakage-resilient authenticated key exchange

Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models...

Full description

Saved in:
Bibliographic Details
Main Authors: CHEN, Rongmao, MU, Yi, YANG, Guomin, SUSILO, Willy, GUO, Fuchun
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7424
https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8427
record_format dspace
spelling sg-smu-ink.sis_research-84272022-10-13T05:47:39Z Strongly leakage-resilient authenticated key exchange CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK (CLR- eCKCLR- eCK) model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key (i.e., randomness). Second, we propose a general framework for constructing one-round CLR- eCKCLR- eCK-secure AKE protocols based on smooth projective hash functions (SPHFs). Finally, we present a practical instantiation of the general framework based on the Decisional Diffie-Hellman assumption without random oracle. Our result shows that the instantiation is efficient in terms of the communication and computation overhead and captures more general leakage attacks. 2016-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7424 info:doi/10.1007/978-3-319-29485-8_2 https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated key exchange Challenge-dependent leakage Smooth projective hash function Strong randomness extractor Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Authenticated key exchange
Challenge-dependent leakage
Smooth projective hash function
Strong randomness extractor
Information Security
spellingShingle Authenticated key exchange
Challenge-dependent leakage
Smooth projective hash function
Strong randomness extractor
Information Security
CHEN, Rongmao
MU, Yi
YANG, Guomin
SUSILO, Willy
GUO, Fuchun
Strongly leakage-resilient authenticated key exchange
description Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK (CLR- eCKCLR- eCK) model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key (i.e., randomness). Second, we propose a general framework for constructing one-round CLR- eCKCLR- eCK-secure AKE protocols based on smooth projective hash functions (SPHFs). Finally, we present a practical instantiation of the general framework based on the Decisional Diffie-Hellman assumption without random oracle. Our result shows that the instantiation is efficient in terms of the communication and computation overhead and captures more general leakage attacks.
format text
author CHEN, Rongmao
MU, Yi
YANG, Guomin
SUSILO, Willy
GUO, Fuchun
author_facet CHEN, Rongmao
MU, Yi
YANG, Guomin
SUSILO, Willy
GUO, Fuchun
author_sort CHEN, Rongmao
title Strongly leakage-resilient authenticated key exchange
title_short Strongly leakage-resilient authenticated key exchange
title_full Strongly leakage-resilient authenticated key exchange
title_fullStr Strongly leakage-resilient authenticated key exchange
title_full_unstemmed Strongly leakage-resilient authenticated key exchange
title_sort strongly leakage-resilient authenticated key exchange
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/7424
https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf
_version_ 1770576337004658688