Netinfo Security ›› 2016, Vol. 16 ›› Issue (4): 31-37.doi: 10.3969/j.issn.1671-1122.2016.04.005

• Orginal Article • Previous Articles     Next Articles

A Leakage Resilient Authenticated Key Exchange Protocol Based on the CAFL Model

Siqi LU1,2, Shuhui FAN1, Xu HAN1, Qingfeng CHENG1,2,3()   

  1. 1. Luoyang University of Foreign Languages, Luoyang Henan 471003, China
    2. State Key Laboratory of Cryptology, Beijing 100878, China
    3. School of Computer Science and Technology, Xidian University, Xi’an Shaanxi 710071, China
  • Received:2016-01-10 Online:2016-04-20 Published:2020-05-13

Abstract:

The initial goal of the leakage resilient protocols is to decrease the damages resulted from leakage of stored secrets. Alawatugoda proposed a genetic protocol π based on the secure CAFL model, which was proved to be long-term key reveal secure under passive attack but not ephemeral key reveal secure under active attack. In 2015, for instance, Toorani proposed an ephemeral key compromise impersonation attack on this protocol. Considering the insecurity of the protocol, we propose an improvement based on DDH assumption and CDH assumption, which enables explicit key authentication for the parties. As for the security, the improved protocol is proved capable of stronger securities and of less computation costs under the standard model . In addition, analysis and discussion of protocol π-1 and π-2 is provided in this paper in terms of their computing costs and securities.

Key words: leakage resilient, key exchange, CAFL, ephemeral key leakage attack

CLC Number: