Standard model leakage-resilient authenticated key exchange using inner-product extractors

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Alawatugoda, Janaka
Okamoto, Tatsuaki
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2022
Size
File type(s)
Location
License
Abstract

With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing authenticated key exchange protocols using existing cryptographic schemes is an effective method, as such construction can be instantiated with any appropriate scheme in a way that the formal security argument remains valid. In parallel, constructing authenticated key exchange protocols that are proven to be secure in the standard model is more preferred as they rely on real-world assumptions. In this paper, we present a Diffie–Hellman-style construction of a leakage-resilient authenticated key exchange protocol, that can be instantiated with any CCLA2 -secure public-key encryption scheme and a function from the pseudo-random function family. Our protocol is proven to be secure in the standard model assuming the hardness of the decisional Diffie–Hellman problem. Furthermore, it is resilient to continuous partial leakage of long-term secret keys, that happens even after the session key is established, while satisfying the security features defined by the eCK security model.

Journal Title

Designs, Codes and Cryptography

Conference Title
Book Title
Edition
Volume

90

Issue

4

Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2022 Springer Netherlands. This is an electronic version of an article published in Designs, Codes and Cryptography, 90 (4), pp. 1059-1079, 2022. Designs, Codes and Cryptography is available online at: http://link.springer.com/ with the open URL of your article.

Item Access Status
Note
Access the data
Related item(s)
Subject

Science & Technology

Technology

Physical Sciences

Computer Science, Theory & Methods

Mathematics, Applied

Persistent link to this record
Citation

Alawatugoda, J; Okamoto, T, Standard model leakage-resilient authenticated key exchange using inner-product extractors, Designs, Codes and Cryptography, 2022, 90 (4), pp. 1059-1079

Collections