{"title":"LR-CAKA:用于异构公钥密码系统的防泄漏兼容认证密钥协议","authors":"Ting-Chieh Ho, Yuh-Min Tseng, Sen-Shan Huang","doi":"10.1016/j.jisa.2025.104222","DOIUrl":null,"url":null,"abstract":"<div><div>Authenticated key agreement (AKA) is a fundamental cryptographic primitive that enables two remote members in a public-key cryptosystem (PKCS) to mutually authenticate and generate a session key, which is then used to encrypt and decrypt messages between them. In the past, numerous AKA protocols based on various PKCSs have been designed. In response to the growing threat of side-channel attacks, researchers have proposed some leakage-resilient AKA (LR-AKA) protocols that maintain security even when partial private key information is exposed. However, existing LR-AKA protocols are generally designed for homogeneous environments, where both members operate within the same PKCS. To address this limitation, we propose the <em>first</em> leakage-resilient compatible AKA (LR-CAKA) protocol for heterogeneous PKCSs. The LR-CAKA protocol enables secure and efficient authenticated key agreement between two members operating under different PKCSs, specifically between a member in the public-key infrastructure PKCS (PKI-PKCS) and the other in the certificateless PKCS (CL-PKCS). Also, we introduce a PKCS upgrade procedure from the PKI-PKCS to the CL-PKCS. The security of the LR-CAKA protocol is formally proven using a technique based on the generic bilinear group (GBG) model, under the discrete logarithm (DL), computational Diffie–Hellman (CDH) and hash function (HF) assumptions. Finally, performance evaluations and comparative analysis demonstrate that the LR-CAKA protocol offers significant advantages over existing LR-AKA protocols.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104222"},"PeriodicalIF":3.7000,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"LR-CAKA: A leakage-resilient compatible authenticated key agreement protocol for heterogeneous public-key cryptosystems\",\"authors\":\"Ting-Chieh Ho, Yuh-Min Tseng, Sen-Shan Huang\",\"doi\":\"10.1016/j.jisa.2025.104222\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Authenticated key agreement (AKA) is a fundamental cryptographic primitive that enables two remote members in a public-key cryptosystem (PKCS) to mutually authenticate and generate a session key, which is then used to encrypt and decrypt messages between them. In the past, numerous AKA protocols based on various PKCSs have been designed. In response to the growing threat of side-channel attacks, researchers have proposed some leakage-resilient AKA (LR-AKA) protocols that maintain security even when partial private key information is exposed. However, existing LR-AKA protocols are generally designed for homogeneous environments, where both members operate within the same PKCS. To address this limitation, we propose the <em>first</em> leakage-resilient compatible AKA (LR-CAKA) protocol for heterogeneous PKCSs. The LR-CAKA protocol enables secure and efficient authenticated key agreement between two members operating under different PKCSs, specifically between a member in the public-key infrastructure PKCS (PKI-PKCS) and the other in the certificateless PKCS (CL-PKCS). Also, we introduce a PKCS upgrade procedure from the PKI-PKCS to the CL-PKCS. The security of the LR-CAKA protocol is formally proven using a technique based on the generic bilinear group (GBG) model, under the discrete logarithm (DL), computational Diffie–Hellman (CDH) and hash function (HF) assumptions. Finally, performance evaluations and comparative analysis demonstrate that the LR-CAKA protocol offers significant advantages over existing LR-AKA protocols.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"94 \",\"pages\":\"Article 104222\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002595\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002595","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
LR-CAKA: A leakage-resilient compatible authenticated key agreement protocol for heterogeneous public-key cryptosystems
Authenticated key agreement (AKA) is a fundamental cryptographic primitive that enables two remote members in a public-key cryptosystem (PKCS) to mutually authenticate and generate a session key, which is then used to encrypt and decrypt messages between them. In the past, numerous AKA protocols based on various PKCSs have been designed. In response to the growing threat of side-channel attacks, researchers have proposed some leakage-resilient AKA (LR-AKA) protocols that maintain security even when partial private key information is exposed. However, existing LR-AKA protocols are generally designed for homogeneous environments, where both members operate within the same PKCS. To address this limitation, we propose the first leakage-resilient compatible AKA (LR-CAKA) protocol for heterogeneous PKCSs. The LR-CAKA protocol enables secure and efficient authenticated key agreement between two members operating under different PKCSs, specifically between a member in the public-key infrastructure PKCS (PKI-PKCS) and the other in the certificateless PKCS (CL-PKCS). Also, we introduce a PKCS upgrade procedure from the PKI-PKCS to the CL-PKCS. The security of the LR-CAKA protocol is formally proven using a technique based on the generic bilinear group (GBG) model, under the discrete logarithm (DL), computational Diffie–Hellman (CDH) and hash function (HF) assumptions. Finally, performance evaluations and comparative analysis demonstrate that the LR-CAKA protocol offers significant advantages over existing LR-AKA protocols.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.