信息网络安全 ›› 2016, Vol. 16 ›› Issue (4): 31-37.doi: 10.3969/j.issn.1671-1122.2016.04.005

• • 上一篇    下一篇

一种基于CAFL模型的抗弹性泄露密钥交换协议研究

陆思奇1,2, 范书珲1, 韩旭1, 程庆丰1,2,3()   

  1. 1.洛阳外国语学院,河南洛阳 471003
    2.密码科学技术国家重点实验室,北京 100878
    3.西安电子科技大学计算机学院,陕西西安 710071
  • 收稿日期:2016-01-10 出版日期:2016-04-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 陆思奇(1990—),男,山东,助教,硕士,主要研究方向为密码学和信息安全;范书珲(1993—),女,广东,研究实习员,主要研究方向为密码学和信息安全;韩旭(1992—),男,河南,硕士研究生,主要研究方向为密码学和信息安全;程庆丰(1979—),男,辽宁,副教授,博士,主要研究方向为密码学和信息安全。

  • 基金资助:
    国家自然科学基金[61402522];密码科学技术国家重点实验室开放课题[2015-MS-07];洛阳外国语学院科研基金[2015XYQ004]

A Leakage Resilient Authenticated Key Exchange Protocol Based on the CAFL Model

Siqi LU1,2, Shuhui FAN1, Xu HAN1, Qingfeng CHENG1,2,3()   

  1. 1. Luoyang University of Foreign Languages, Luoyang Henan 471003, China
    2. State Key Laboratory of Cryptology, Beijing 100878, China
    3. School of Computer Science and Technology, Xidian University, Xi’an Shaanxi 710071, China
  • Received:2016-01-10 Online:2016-04-20 Published:2020-05-13

摘要:

抗弹性泄露密钥交换协议的最初目标就是将存储秘密泄露的危害降到最小,为此Alawatugoda等人提出了基于CAFL安全模型的π协议。该协议在被动攻击下即使一方长期密钥泄露仍是安全的,但在主动攻击下如果一方临时密钥泄露则是不安全的。Toorani等人在2015年给出了对该协议的临时密钥泄露攻击方法。文章针对该安全隐患,在CAFL模型下基于DDH假设和CDH假设对π协议进行了改进,实现了协议参与双方的显式认证。在安全性方面,对其在标准模型下以牺牲较小计算代价获得强安全性进行了证明。此外,文章对π-1协议和 π-2协议的计算代价和安全性进行了分析和讨论。

关键词: 弹性泄露, 密钥交换, CAFL, 临时密钥泄露攻击

Abstract:

The initial goal of the leakage resilient protocols is to decrease the damages resulted from leakage of stored secrets. Alawatugoda proposed a genetic protocol π based on the secure CAFL model, which was proved to be long-term key reveal secure under passive attack but not ephemeral key reveal secure under active attack. In 2015, for instance, Toorani proposed an ephemeral key compromise impersonation attack on this protocol. Considering the insecurity of the protocol, we propose an improvement based on DDH assumption and CDH assumption, which enables explicit key authentication for the parties. As for the security, the improved protocol is proved capable of stronger securities and of less computation costs under the standard model . In addition, analysis and discussion of protocol π-1 and π-2 is provided in this paper in terms of their computing costs and securities.

Key words: leakage resilient, key exchange, CAFL, ephemeral key leakage attack

中图分类号: