Strongly leakage-resilient authenticated key exchange
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7424 https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8427 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84272022-10-13T05:47:39Z Strongly leakage-resilient authenticated key exchange CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK (CLR- eCKCLR- eCK) model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key (i.e., randomness). Second, we propose a general framework for constructing one-round CLR- eCKCLR- eCK-secure AKE protocols based on smooth projective hash functions (SPHFs). Finally, we present a practical instantiation of the general framework based on the Decisional Diffie-Hellman assumption without random oracle. Our result shows that the instantiation is efficient in terms of the communication and computation overhead and captures more general leakage attacks. 2016-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7424 info:doi/10.1007/978-3-319-29485-8_2 https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated key exchange Challenge-dependent leakage Smooth projective hash function Strong randomness extractor Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Authenticated key exchange Challenge-dependent leakage Smooth projective hash function Strong randomness extractor Information Security |
spellingShingle |
Authenticated key exchange Challenge-dependent leakage Smooth projective hash function Strong randomness extractor Information Security CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun Strongly leakage-resilient authenticated key exchange |
description |
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK (CLR- eCKCLR- eCK) model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key (i.e., randomness). Second, we propose a general framework for constructing one-round CLR- eCKCLR- eCK-secure AKE protocols based on smooth projective hash functions (SPHFs). Finally, we present a practical instantiation of the general framework based on the Decisional Diffie-Hellman assumption without random oracle. Our result shows that the instantiation is efficient in terms of the communication and computation overhead and captures more general leakage attacks. |
format |
text |
author |
CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun |
author_facet |
CHEN, Rongmao MU, Yi YANG, Guomin SUSILO, Willy GUO, Fuchun |
author_sort |
CHEN, Rongmao |
title |
Strongly leakage-resilient authenticated key exchange |
title_short |
Strongly leakage-resilient authenticated key exchange |
title_full |
Strongly leakage-resilient authenticated key exchange |
title_fullStr |
Strongly leakage-resilient authenticated key exchange |
title_full_unstemmed |
Strongly leakage-resilient authenticated key exchange |
title_sort |
strongly leakage-resilient authenticated key exchange |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/7424 https://ink.library.smu.edu.sg/context/sis_research/article/8427/viewcontent/Strongly_leakage_resilient_authenticated_key_exchange.pdf |
_version_ |
1770576337004658688 |