Standard model leakage-resilient authenticated key exchange using inner-product extractors
File version
Accepted Manuscript (AM)
Author(s)
Okamoto, Tatsuaki
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
License
Abstract
With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing authenticated key exchange protocols using existing cryptographic schemes is an effective method, as such construction can be instantiated with any appropriate scheme in a way that the formal security argument remains valid. In parallel, constructing authenticated key exchange protocols that are proven to be secure in the standard model is more preferred as they rely on real-world assumptions. In this paper, we present a Diffie–Hellman-style construction of a leakage-resilient authenticated key exchange protocol, that can be instantiated with any CCLA2 -secure public-key encryption scheme and a function from the pseudo-random function family. Our protocol is proven to be secure in the standard model assuming the hardness of the decisional Diffie–Hellman problem. Furthermore, it is resilient to continuous partial leakage of long-term secret keys, that happens even after the session key is established, while satisfying the security features defined by the eCK security model.
Journal Title
Designs, Codes and Cryptography
Conference Title
Book Title
Edition
Volume
90
Issue
4
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2022 Springer Netherlands. This is an electronic version of an article published in Designs, Codes and Cryptography, 90 (4), pp. 1059-1079, 2022. Designs, Codes and Cryptography is available online at: http://link.springer.com/ with the open URL of your article.
Item Access Status
Note
Access the data
Related item(s)
Subject
Science & Technology
Technology
Physical Sciences
Computer Science, Theory & Methods
Mathematics, Applied
Persistent link to this record
Citation
Alawatugoda, J; Okamoto, T, Standard model leakage-resilient authenticated key exchange using inner-product extractors, Designs, Codes and Cryptography, 2022, 90 (4), pp. 1059-1079