Continuous after-the-fact leakage-resilient eCK-secure key exchange

No Thumbnail Available
File version
Author(s)
Alawatugoda, J
Stebila, D
Boyd, C
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Groth, Jens

Date
2015
Size
File type(s)
Location

Oxford, United Kingdom

License
Abstract

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Journal Title
Conference Title

Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings

Book Title
Edition
Volume

9496

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject

Cryptography

Information and computing sciences

Persistent link to this record
Citation

Alawatugoda, J; Stebila, D; Boyd, C, Continuous after-the-fact leakage-resilient eCK-secure key exchange, Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings, 2015, 9496, pp. 277-294