Leakage resilient authenticated key exchange secure in the auxiliary input model

Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

21 Citations (Scopus)

Abstract

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resilient AKE in the auxiliary input model. A promising way to construct such a protocol is to use a digital signature scheme that is entropically-unforgeable under chosen message and auxiliary input attacks. However, to date we are not aware of any digital signature scheme that can satisfy this requirement. On the other hand, we show that in the random oracle model, it is sufficient to use a digital signature scheme that is secure under random message and auxiliary input attacks in order to build a secure AKE protocol in the auxiliary input model, while the existence of such a digital signature scheme has already been proven. We will also give a comparison between the existing public-key encryption based and digital signature based leakage resilient AKE protocols. We show that the latter can provide a higher level of security than the former. © 2013 Springer-Verlag.
Original languageEnglish
Title of host publicationInformation Security Practice and Experience
Subtitle of host publication9th International Conference, ISPEC 2013, Proceedings
PublisherSpringer Verlag
Pages204-217
Volume7863 LNCS
ISBN (Print)9783642380327
DOIs
Publication statusPublished - 2013
Event9th International Conference on Information Security Practice and Experience, ISPEC 2013 - Lanzhou, China
Duration: 12 May 201314 May 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7863 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Information Security Practice and Experience, ISPEC 2013
PlaceChina
CityLanzhou
Period12/05/1314/05/13

Research Keywords

  • authenticated key exchange
  • auxiliary input model
  • Leakage resilient cryptography

Fingerprint

Dive into the research topics of 'Leakage resilient authenticated key exchange secure in the auxiliary input model'. Together they form a unique fingerprint.

Cite this