2019
DOI: 10.1109/jsyst.2019.2896132
|View full text |Cite
|
Sign up to set email alerts
|

An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 22 publications
(33 citation statements)
references
References 34 publications
0
33
0
Order By: Relevance
“…Recently, in the BLReCK model, Ruan et al [45] presented a secure LR-IDAKE protocol and the total leaked bit size of private keys is limited. In 2019, Wu et al [46] further presented a secure LR-IDAKE protocol in the CLReCK model that permits adversaries to continually fetch fractional content of private keys and possesses overall unbounded leakage property.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, in the BLReCK model, Ruan et al [45] presented a secure LR-IDAKE protocol and the total leaked bit size of private keys is limited. In 2019, Wu et al [46] further presented a secure LR-IDAKE protocol in the CLReCK model that permits adversaries to continually fetch fractional content of private keys and possesses overall unbounded leakage property.…”
Section: Related Workmentioning
confidence: 99%
“…In the following, based on the CLReCK model in [42], [46], we define the associated CLReCK model of LR-CLAKE protocols to model the abilities of adversaries under the CL-PKC settings. As mentioned earlier, in a CL-PKC setting, the KGC has the long-term system secret key SSK.…”
Section: Security Notions (Adversary Model) Of Lr-clake Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…J. Wu et al [10] suggest a new session-based protocol named ID-CL-eCK that is an identity-based authenticated key exchange and this is the advancement of LR-ID-AKE. The leakage resilient based researches are carried out by [11 -14] and the proposed protocol is the advancement of that research.…”
Section: Fig 1 Overview Of Literature Reviewmentioning
confidence: 99%
“…In the bounded leakage model [21], [23], the total amount of leakage information during the life time of the cryptographic scheme have to be bounded to a fixed ratio or bit-length. On the other hand, in the continuous leakage model [22], [26], [27], [28], adversaries are permitted to continuously gain partial information of these secret values for each invocation of the cryptographic scheme while the whole leakage amount is unbounded during the life time of the cryptographic scheme. Obviously, the continuous leakage model has less restrictions and possesses overall unbounded leakage property.…”
Section: Introductionmentioning
confidence: 99%