Filters








48,665 Hits in 4.2 sec

Modelling after-the-fact leakage for key exchange

Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
Our model is the strongest known partial-leakage-based security model for key exchange protocols.  ...  Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values.  ...  In leakage models for public-key cryptosystems, after-the-fact leakage is the leakage which happens after the challenge ciphertext is given whereas in leakage-resilient key exchange security models, after-the-fact  ... 
doi:10.1145/2590296.2590317 dblp:conf/ccs/AlawatugodaSB14 fatcat:j3xl3svq7vcpzbdrrcgllzn3ye

Continuous After-the-Fact Leakage-Resilient Key Exchange [chapter]

Janaka Alawatugoda, Colin Boyd, Douglas Stebila
2014 Lecture Notes in Computer Science  
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys.  ...  protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage  ...  In this section we introduce the continuous after-the-fact leakage model, (CAFL model), for key exchange.  ... 
doi:10.1007/978-3-319-08344-5_17 fatcat:vxydfqytvndo5jwuizmjqyrkh4

Review on Leakage Resilient Key Exchange Security Model

Zheng Wei Clement Chan, Chai Wen Chuah, Janaka Alawatugoda
2022 International Journal of Communication Networks and Information Security  
This work review how a leakage resilient security model for a key exchange protocol has been evolved over years according to the increasing security requirement which covers a different range of attacks  ...  Then, the key exchange protocol is proved with leakage resilient security model to determine whether its security proof can provide the security properties it claimed or to find out any unexamined flaw  ...  Thank RongMao Chen for his helpful comments during the work of this paper.  ... 
doi:10.17762/ijcnis.v11i1.3790 fatcat:rznx7bt5hzfdxbzxkcaghumriu

Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange [chapter]

Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2015 Lecture Notes in Computer Science  
In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model.  ...  We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.  ...  Further, the authors are grateful to Professor Tatsuaki Okamoto for valuable discussions on leakage-resilient cryptography, while Janaka Alawatugoda is visiting NTT Secure Platform Laboratories, NTT Corporation  ... 
doi:10.1007/978-3-319-27239-9_17 fatcat:k3f5izkt2vb5tiaj2fltuy5hdi

On the leakage-resilient key exchange

Janaka Alawatugoda
2017 Journal of Mathematical Cryptology  
Security models for two-party authenticated key exchange protocols have been developed over time to provide security even when the adversary learns certain secret values.  ...  This paper combines and extends the advances of security modelling for AKE protocols addressing more granular partial leakage of long-term secrets of protocol participants.  ...  Acknowledgment: I would like to acknowledge Douglas Stebila, Colin Boyd and Tatsuaki Okamoto for numerous discussions on key exchange protocols and leakage-resilient cryptography.  ... 
doi:10.1515/jmc-2016-0003 fatcat:rfvikx5v2rhehhwebgdb4aiv5q

On Continuous After-the-Fact Leakage-Resilient Key Exchange

Mohsen Toorani
2015 Proceedings of the Second Workshop on Cryptography and Security in Computing Systems - CS2 '15  
Recently, the Continuous After-the-Fact Leakage (CAFL) security model has been introduced for two-party authenticated key exchange (AKE) protocols.  ...  A generic leakage-resilient key exchange protocol π has also been introduced that is formally proved to be secure in the CAFL model.  ...  In an attempt to solve the mentioned open problem, they introduced the Continuous After-the-Fact Leakage (CAFL) model [1] which is a weaker variant of the ASB continuous leakage model.  ... 
doi:10.1145/2694805.2694811 dblp:conf/hipeac/Toorani15 fatcat:324nt6errjerbkjidgyd2v7pqa

Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE [chapter]

Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2017 Lecture Notes in Computer Science  
We then present another generic compiler for transforming an after-the-fact leakage-resilient CCA-2 secure PKE to a leakage-resilient authenticated key exchange (AKE) protocol in the bounded after-the-fact  ...  The salient feature of our transformation is that the leakage rate (defined as the ratio of the amount of leakage to the size of secret key) of the transformed after-the-fact CCA-2 secure PKE is same as  ...  However, it also does not capture afterthe-fact leakage. In the context of key exchange, after-the-fact leakage was first modeled by Alawatugoda et al.  ... 
doi:10.1007/978-3-319-60055-0_18 fatcat:ow64pqkxqratvk6dzn55sfripq

Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange

Ou Ruan, Zihao Wang, Qingping Wang, Mingwu Zhang
2019 International Journal of Network Security  
In this work, we first formalize a continuous after-the-fact (AF) security model for leakage-resilient (LR) group password-authenticated key exchange (GPAKE) protocol, where the leakages are continuous  ...  as the secret key.  ...  In this paper, we propose a continuous after-the-fact (AF) LR (λ-CAFLR) security model for GPAKE protocol.  ... 
dblp:journals/ijnsec/RuanWWZ19 fatcat:xpqbzmk27vdv7e63johfddzmzq

New approach to practical leakage-resilient public-key cryptography

Suvradip Chakraborty, Janaka Alawatugoda, Chandrasekaran Pandu Rangan
2019 Journal of Mathematical Cryptology  
We introduce an appropriate security model for LR-NIKE protocols in the bounded memory leakage (BML) settings.  ...  low-latency key exchange (LLKE) protocols.  ...  Here B/C stands for either bounded or continuous memory leakage; BFL/AFL denotes the resilience of the AKE protocols to before-the-fact/after-the-fact leakage attacks.  ... 
doi:10.1515/jmc-2019-0014 fatcat:3q7qeb45pfaqjizpzdlhcemf2q

Leakage resilient eCK-secure key exchange protocol without random oracles

Daisuke Moriyama, Tatsuaki Okamoto
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
This paper presents the first formalization of partial key leakage security of a two-pass two-party authenticated key exchange (AKE) protocol on the extended Canetti-Krawczyk (eCK) security model.  ...  Our formalization, λ-leakage resilient eCK security, is a (stronger) generalization of the eCK security model with enhanced by the notion of λ-leakage resilient security recently introduced by Akavia,  ...  Therefore, leakage resilience on the ephemeral secret key is not suitable for key exchange security model and we only focus on the static secret key leakage.  ... 
doi:10.1145/1966913.1966976 dblp:conf/ccs/MoriyamaO11 fatcat:xnyvk5qrfbcmfdwcvq5plx6bpq

Strongly Leakage-Resilient Authenticated Key Exchange [chapter]

Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016 Lecture Notes in Computer Science  
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions.  ...  First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in  ...  We would like to thank Janaka Alawatugoda and the anonymous reviewers for their invaluable comments on a previous version of this paper.  ... 
doi:10.1007/978-3-319-29485-8_2 fatcat:rqf2awhpijbpvprzskzfhoydqq

Leakage-Resilient Authenticated Key Establishment Protocols [chapter]

SeongHan Shin, Kazukuni Kobara, Hideki Imai
2003 Lecture Notes in Computer Science  
Since the information leakage would be more conceivable than breaking down the underlying cryptosystems, it is desirable to enhance the immunity to the leakage.  ...  In this paper, we review AKE protocols from a little bit different point of view, i.e. the relationship between information a client needs to possess (for authentication) and immunity to the respective  ...  Acknowledgements The authors would like to thank anonymous referees for useful comments.  ... 
doi:10.1007/978-3-540-40061-5_10 fatcat:lesfykc63ja4veoixx3vdrbrza

CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs

Yi Zhao, Kaitai Liang, Bo Yang, Liqun Chen
2019 Security and Communication Networks  
They presented achievable public key encryption (PKE) schemes which are semantically secure against after-the-fact leakage in the split-state model.  ...  To obtain security against chosen ciphertext attack (CCA) for PKE schemes against after-the-fact leakage attack (AFL), existing works followed the paradigm of "double encryption" which needs noninteractive  ...  After-the-Fact Leakage Resilience.  ... 
doi:10.1155/2019/8357241 fatcat:jxvsv3tlqnflnefjx4jb4oh2fi

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model [chapter]

Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
2013 Lecture Notes in Computer Science  
In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model.  ...  In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model.  ...  In other words, the auxiliary input model has eliminated the leakage bound, and therefore can capture a larger class of leakage functions. Authenticated Key Exchange.  ... 
doi:10.1007/978-3-642-38033-4_15 fatcat:hqoddtn46vhkdjkcegngtcbley

Strong authenticated key exchange with auxiliary inputs

Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016 Designs, Codes and Cryptography  
In this work, we revisit the modelling and design of authenticated key exchange (AKE) protocols with leakage resilience.  ...  To close this research gap, we propose a new security notion named leakage-resilient eCK model w.r.t. auxiliary inputs (AI-LR-eCK) for AKE protocols, which addresses the limitations of the previous models  ...  Zheng Yang for pointing out the subtle flaw in the security proof of the previous version and also his valuable comments on our fixing solution.  ... 
doi:10.1007/s10623-016-0295-3 fatcat:umgccdqumjfyhbhlui65irg6l4
« Previous Showing results 1 — 15 out of 48,665 results