Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1109/access.2018.2799298
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…Continual leakage security models emerged prominently due to the side‐channel attacks; therefore, many security models are developed to cope with continually revealing long‐term and short‐term secrets in the case of establishing a session key during the cryptographic protocol run 18–24 . There are four properties of the continual leakage models, namely, the only computation leakage, bounded leakage of single computation round, independent leakage between computation rounds, and overall unbounded leakage 24 …”
Section: The Security Models and The Proposed Ecke Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Continual leakage security models emerged prominently due to the side‐channel attacks; therefore, many security models are developed to cope with continually revealing long‐term and short‐term secrets in the case of establishing a session key during the cryptographic protocol run 18–24 . There are four properties of the continual leakage models, namely, the only computation leakage, bounded leakage of single computation round, independent leakage between computation rounds, and overall unbounded leakage 24 …”
Section: The Security Models and The Proposed Ecke Modelmentioning
confidence: 99%
“…The ephemeral‐key reveal query was introduced in the extended CK (eCK) model instead of the session‐state reveal query in the original model 10 therefore, many security models have been proposed to clarify what kinds of information could be revealed from session state 11–17 . The continual leakage security models emerged prominently due to side‐channel attacks; therefore, many security models are developed to cope with continually revealing long‐term and short‐term secrets in the case of establishing a session key during the cryptographic protocol run 18–24 …”
Section: Introductionmentioning
confidence: 99%
“…However, the key update technique is time-consuming. Recently, Wu et al [42] proposed an efficient LR-AKE protocol in the CLReCK model. In Wu et al's protocol, they employed the multiplicative blinding method [23], [24], [25] to reduce the computation cost of the key update procedure.…”
Section: Related Workmentioning
confidence: 99%
“…In the following, based on the CLReCK model in [42], [46], we define the associated CLReCK model of LR-CLAKE protocols to model the abilities of adversaries under the CL-PKC settings. As mentioned earlier, in a CL-PKC setting, the KGC has the long-term system secret key SSK.…”
Section: Security Notions (Adversary Model) Of Lr-clake Protocolsmentioning
confidence: 99%
“…These leakage-resilient cryptographic schemes allow adversaries to gain partial information of private keys, secret keys and random values while keeping the security of these leakage-resilient cryptographic schemes. In the past decade, numerous leakage-resilient cryptographic primitives based on the traditional public-key settings have been proposed, such as leakage-resilient signature schemes [15], [16], [17], leakage-resilient authenticated key exchange protocols [18], [19], [20] and leakage-resilient encryption schemes [21], [22], [23], [24], [25], [26].…”
Section: Introductionmentioning
confidence: 99%