2022
DOI: 10.1109/ojcs.2022.3198073
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol

Abstract: Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity-based public key systems. In the past, many authenticated key exchange (AKE) protocols based on CB-PKC systems, called CB-AKE, were proposed to be applied to secure communications between two remote participants. However, these existing CB-AKE protocols become insecure since attackers could compute and obtain the whole secret key from s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…Traditional authentication methods often need one of the wellknown authentication elements, such as a secret the user knows or a token the user possesses, to verify the identity of a user. Two-factor authentication and multi-factor authentication are two examples of current authentication methods that use multiple authentication factors to verify the identity of a person or device [8]. To make it extremely difficult, if not impossible, for an unauthorized party to obtain access to a protected resource, security experts have developed two-or multi-factor authentication systems [9].…”
Section: Introductionmentioning
confidence: 99%
“…Traditional authentication methods often need one of the wellknown authentication elements, such as a secret the user knows or a token the user possesses, to verify the identity of a user. Two-factor authentication and multi-factor authentication are two examples of current authentication methods that use multiple authentication factors to verify the identity of a person or device [8]. To make it extremely difficult, if not impossible, for an unauthorized party to obtain access to a protected resource, security experts have developed two-or multi-factor authentication systems [9].…”
Section: Introductionmentioning
confidence: 99%
“…The spread of information across a network requires security [ 7 , 8 , 9 , 10 ]. The standard for a QR code is public, and its security on the Internet is dependent on methods such as authenticated key exchange [ 11 , 12 , 13 , 14 ], watermarking technology [ 15 , 16 , 17 , 18 ], or information hiding [ 19 , 20 , 21 ].…”
Section: Introductionmentioning
confidence: 99%
“…The practicality of the bounded leakage model is limited because it restricts the total number of bits from a private key that can be disclosed to attackers during the system lifecycle to a fixed amount [27], [28]. The continual leakage model allows attackers to gradually acquire portions (partial bits) of private keys used in each computation, allowing the leakage unbounded [29], [30], [31], [32], [33]. Although some LR-CLSC schemes [34], [35] have been proposed, the schemes can only guarantee the security under a bounded leakage model.…”
Section: Introductionmentioning
confidence: 99%