Continuous after-the-fact leakage-resilient eCK-secure key exchange


Autoria(s): Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin
Contribuinte(s)

Groth, Jens

Data(s)

15/12/2015

Resumo

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/91152/

Publicador

Springer International Publishing

Relação

http://eprints.qut.edu.au/91152/1/IMACC-AlaSteBoy15-full.pdf

DOI:10.1007/978-3-319-27239-9_17

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. In Groth, Jens (Ed.) Lecture Notes in Computer Science, Springer International Publishing, University of Oxford, Oxford, UK, pp. 277-294.

http://purl.org/au-research/grants/ARC/DP130104304

Direitos

Copyright 2015 Springer International Publishing Switzerland

The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-27239-9_17

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty

Palavras-Chave #080402 Data Encryption #key exchange protocols #side-channel attacks #security models #leakage-resilience #after-the-fact leakage
Tipo

Conference Paper