Journal of Information Processing
Online ISSN : 1882-6652
ISSN-L : 1882-6652
 
Big Data-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage without Random Oracles
Ren IshibashiKazuki Yoneyama
Author information
JOURNAL FREE ACCESS

2024 Volume 32 Pages 690-709

Details
Abstract

Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. At ISC 2021, Liu, Tang, and Zhou proposed a modular multi-factor AKE framework resilient to a characteristic attack called server compromise impersonation based on big data in the bounded-retrieval model and concrete post-quantum big data-based AKE schemes. They also formulated a security model (LTZ model) that captures perfect forward secrecy, key compromise impersonation, and server compromise impersonation. However, the LTZ model does not consider the compromise of ephemeral secret keys, and their schemes rely on the random oracle model. In this paper, we extend the LTZ model (LTZ-eCK model) to capture the compromise of ephemeral secret keys and propose a generic construction of big data-based AKE resilient to both server compromise impersonation and ephemeral key leakage in the standard model. Our generic construction allows us to achieve the post-quantum big data-based AKE scheme (from isogenies, lattice, etc.) in the LTZ-eCK model without random oracles.

Content from these authors
© 2024 by the Information Processing Society of Japan
Previous article Next article
feedback
Top