Continuous After-the-fact Leakage-Resilient Key Exchange (full version)

@article{Alawatugoda2014ContinuousAL,
  title={Continuous After-the-fact Leakage-Resilient Key Exchange (full version)},
  author={Janaka Alawatugoda and Colin Boyd and Douglas Stebila},
  journal={IACR Cryptology ePrint Archive},
  year={2014},
  volume={2014},
  pages={264}
}
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 27 references

Continuous after-the-fact leakage-resilient key exchange

  • J. Alawatugoda, C. Boyd, D. Stebila
  • ACISP,
  • 2014
1 Excerpt

Similar Papers

Loading similar papers…