首页> 外文会议>Cryptographers' track at the RSA conference >Strongly Leakage-Resilient Authenticated Key Exchange
【24h】

Strongly Leakage-Resilient Authenticated Key Exchange

机译:高度防泄漏的认证密钥交换

获取原文

摘要

Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK (CLR-eCK) model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key (i.e., randomness). Second, we propose a general framework for constructing one-round CLR-eCK-secure AKE protocols based on smooth projec-tive hash functions (SPHFs). Finally, we present a practical instantiation of the general framework based on the Decisional Diffie-Helhnan assumption without random oracle. Our result shows that the instantiation is efficient in terms of the communication and computation overhead and captures more general leakage attacks.
机译:经过身份验证的密钥交换(AKE)协议已广泛部署在许多用于保护通信通道的实际应用中。在本文中,我们进行以下贡献。首先,我们重新审视泄漏弹性AKE协议的安全建模,并表明现有模型施加了一些不自然的限制,或者不充分捕获现实中的泄漏攻击。然后,我们引入了一个新的强大且有意义的安全模型,名为挑战依赖性泄漏弹性ECK(CLR-ECK)模型,以捕获对长期秘密密钥和短期秘密密钥(即随机性)的挑战依赖性泄漏攻击。其次,我们提出了一种基于平滑的Projec-Tive散列函数(SPHFS)构建一轮CLR-ECK-SERVE AKE协议的一般框架。最后,我们在没有随机甲骨文的情况下,基于毁灭性的不同 - 赫尔赫南假设的一般框架的实际实例化。我们的结果表明,在通信和计算开销方面,实例化是有效的,并且捕获更一般的泄漏攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号