Intrusion-Resilient Key Exchange in the Bounded Retrieval Model

  title={Intrusion-Resilient Key Exchange in the Bounded Retrieval Model},
  author={David Cash and Yan Zong Ding and Yevgeniy Dodis and Wenke Lee and Richard J. Lipton and Shabsi Walfish},
We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to cope with an active adversary who can repeatedly compromise the user’s machine and perform any efficient computation on the entire shared key. However, we assume that the attacker is communication bounded and unable to retrieve too much information during each successive break-in. In contrast, the users read only a small… CONTINUE READING