期刊论文详细信息
Journal of mathematical cryptology
On the leakage-resilient key exchange
article
Janaka Alawatugoda1 
[1] Department of Computer Engineering, University of Peradeniya
关键词: Key exchange protocols;    security models;    leakage-resilient cryptography;   
DOI  :  10.1515/jmc-2016-0003
学科分类:社会科学、人文和艺术(综合)
来源: De Gruyter
PDF
【 摘 要 】

Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel attacks. Security models for two-party authenticated key exchange protocols have been developed over time to provide security even when the adversary learns certain secret values. This paper combines and extends the advances of security modelling for AKE protocols addressing more granular partial leakage of long-term secrets of protocol participants. Further, we fix some flaws in security proofs of previous leakage-resilient key exchange protocols.

【 授权许可】

CC BY|CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO202107200005239ZK.pdf 1210KB PDF download
  文献评价指标  
  下载次数:12次 浏览次数:1次