Paper 2021/861

Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors

Janaka Alawatugoda and Tatsuaki Okamoto

Abstract

With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing authenticated key exchange protocols using existing cryptographic schemes is an effective method, as such construction can be instantiated with any appropriate scheme in a way that the formal security argument remains valid. In parallel, constructing authenticated key exchange protocols that are proven to be secure in the standard model is more preferred as they rely on real-world assumptions. In this paper, we present a Diffie-Hellman-style construction of a leakage-resilient authenticated key exchange protocol, that can be instantiated with any CCLA2-secure public-key encryption scheme and a function from the pseudo-random function family. Our protocol is proven to be secure in the standard model assuming the hardness of the decisional Diffie-Hellman problem. Furthermore, it is resilient to continuous partial leakage of long-term secret keys, that happens even after the session key is established, while satisfying the security features defined by the eCK security model.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
Leakage-resilient cryptographyAuthenticated key exchangeeCK modelCAFL-eCK modelStandard model
Contact author(s)
alawatugoda @ eng pdn ac lk
History
2021-06-24: received
Short URL
https://ia.cr/2021/861
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/861,
      author = {Janaka Alawatugoda and Tatsuaki Okamoto},
      title = {Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/861},
      year = {2021},
      url = {https://eprint.iacr.org/2021/861}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.