Leakage-Resilient Password-Based Authenticated Key Exchange

Author(s):  
Ou Ruan ◽  
Mingwu Zhang ◽  
Jing Chen
2009 ◽  
Vol 8 (5) ◽  
pp. 2274-2279 ◽  
Author(s):  
Ji Chun ◽  
Jung Hwang ◽  
Dong Lee

2017 ◽  
Vol 11 (4) ◽  
Author(s):  
Janaka Alawatugoda

AbstractTypically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel attacks. Security models for two-party authenticated key exchange protocols have been developed over time to provide security even when the adversary learns certain secret values. This paper combines and extends the advances of security modelling for AKE protocols addressing more granular partial leakage of long-term secrets of protocol participants. Further, we fix some flaws in security proofs of previous leakage-resilient key exchange protocols.


2018 ◽  
Vol 12 (2) ◽  
pp. 2017-2026 ◽  
Author(s):  
Ou Ruan ◽  
Yuanyuan Zhang ◽  
Mingwu Zhang ◽  
Jing Zhou ◽  
Lein Harn

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Tung-Tso Tsai ◽  
Yun-Hsin Chuang ◽  
Yuh-Min Tseng ◽  
Sen-Shan Huang ◽  
Ying-Hao Hung

2019 ◽  
Vol 87 (12) ◽  
pp. 2885-2911 ◽  
Author(s):  
Guomin Yang ◽  
Rongmao Chen ◽  
Yi Mu ◽  
Willy Susilo ◽  
Fuchun Guo ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document