IEEE Access (Jan 2021)

A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism

  • Tung-Tso Tsai,
  • Yun-Hsin Chuang,
  • Yuh-Min Tseng,
  • Sen-Shan Huang,
  • Ying-Hao Hung

DOI
https://doi.org/10.1109/ACCESS.2021.3112900
Journal volume & issue
Vol. 9
pp. 128633 – 128647

Abstract

Read online

Establishing a session key (SSK) is very important for real-world deployment in open networks, which enables secure communication between remote parties. In the past, some authenticated key exchange (AKE) protocols have been proposed to generate a SSK, but the certificate management issue is inhered in the traditional public key infrastructure and must be addressed. To tackle this issue, the identity (ID)-based concept is added to AKE, called ID-AKE. Indeed, the security of the existing AKE/ID-AKE protocols is gaining increasing importance due to some new types of attacks, namely, side-channel attacks. In such attacks, adversaries could obtain secret keys’ partial information during the execution of cryptographic protocols (including AKE/ID-AKE). To withstand such attacks, many leakage-resilient ID-AKE (LR-ID-AKE) protocols resisting side-channel attacks have been proposed. However, these existing LR-ID-AKE protocols have no efficient solution to revoke compromised users. In this article, the first LR-ID-AKE protocol with an efficient revocation mechanism, called LR-RID-AKE, is proposed. The proposed protocol is not only as secure as existing LR-ID-AKE protocols but also able to efficiently revoke compromised users from the system.

Keywords