Paper 2021/861
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors
Janaka Alawatugoda and Tatsuaki Okamoto
Abstract
With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing authenticated key exchange protocols using existing cryptographic schemes is an effective method, as such construction can be instantiated with any appropriate scheme in a way that the formal security argument remains valid. In parallel, constructing authenticated key exchange protocols that are proven to be secure in the standard model is more preferred as they rely on real-world assumptions. In this paper, we present a Diffie-Hellman-style construction of a leakage-resilient authenticated key exchange protocol, that can be instantiated with any CCLA2-secure public-key encryption scheme and a function from the pseudo-random function family. Our protocol is proven to be secure in the standard model assuming the hardness of the decisional Diffie-Hellman problem. Furthermore, it is resilient to continuous partial leakage of long-term secret keys, that happens even after the session key is established, while satisfying the security features defined by the eCK security model.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- Leakage-resilient cryptographyAuthenticated key exchangeeCK modelCAFL-eCK modelStandard model
- Contact author(s)
- alawatugoda @ eng pdn ac lk
- History
- 2021-06-24: received
- Short URL
- https://ia.cr/2021/861
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/861, author = {Janaka Alawatugoda and Tatsuaki Okamoto}, title = {Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/861}, year = {2021}, url = {https://eprint.iacr.org/2021/861} }