On the leakage-resilient key exchange

Loading...
Thumbnail Image
File version

Version of Record (VoR)

Author(s)
Alawatugoda, Janaka
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2017
Size
File type(s)
Location
Abstract

Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel attacks. Security models for two-party authenticated key exchange protocols have been developed over time to provide security even when the adversary learns certain secret values. This paper combines and extends the advances of security modelling for AKE protocols addressing more granular partial leakage of long-term secrets of protocol participants. Further, we fix some flaws in security proofs of previous leakage-resilient key exchange protocols.

Journal Title

Journal of Mathematical Cryptology

Conference Title
Book Title
Edition
Volume

11

Issue

4

Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© The Author(s) 2017. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported (CC BY-NC-ND 3.0) License, which permits unrestricted, non-commercial use, distribution and reproduction in any medium, providing that the work is properly cited.

Item Access Status
Note
Access the data
Related item(s)
Subject

Cryptography

Science & Technology

Technology

Computer Science, Theory & Methods

Computer Science

Key exchange protocols

Persistent link to this record
Citation

Alawatugoda, J, On the leakage-resilient key exchange, Journal of Mathematical Cryptology, 2017, 11 (4), pp. 215-269

Collections