Paper 2017/418

Strong Authenticated Key Exchange with Auxiliary Inputs

Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, and Fuchun Guo


Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we revisit the modelling and design of authenticated key exchange (AKE) protocols with leakage resilience. We show that the prior works on this topic are inadequate in capturing realistic leakage attacks. To close this research gap, we propose a new security notion named \textit{leakage-resilient eCK model w.r.t. auxiliary inputs} ($\mathsf{AI\mbox{-}LR\mbox{-}eCK}$) for AKE protocols, which addresses the limitations of the previous models. Our model allows computationally hard-to-invert leakage of \textit{both the long-term secret key and the randomness}, and also addresses a limitation \tb{existing in most} of the previous models where the adversary is disallowed to make leakage queries during the challenge session. As another major contribution of this work, we present a generic framework for the construction of AKE protocols that are secure under the proposed $\mathsf{AI\mbox{-}LR\mbox{-}eCK}$ model. An instantiation based on the \textit{Decision Diffie-Hellman} (DDH) assumption in the standard model is also given to demonstrate the feasibility of our proposed framework.

Note: Some statements are revised for better readability.

Available format(s)
Publication info
Published elsewhere. Designs, Codes and Cryptography
Authenticated Key Exchange
Contact author(s)
rc517 @ uowmail edu au
2017-06-26: last of 2 revisions
2017-05-15: received
See all versions
Short URL
Creative Commons Attribution


      author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo},
      title = {Strong Authenticated Key Exchange with Auxiliary Inputs},
      howpublished = {Cryptology ePrint Archive, Paper 2017/418},
      year = {2017},
      doi = {10.1007/s10623-016-0295-3},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.