{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:11Z","timestamp":1740142751647,"version":"3.37.3"},"reference-count":30,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702259","61672289","61802242"],"award-info":[{"award-number":["61702259","61672289","61802242"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Authenticated key exchange protocols are quite important primitives for practical applications, since they enable two parties to generate a shared high entropy secret key. In this paper we mainly focus on the authenticated key exchange (AKE) against auxiliary input leakage. As the major contribution of this work, we present a generic framework for the construction of AKE protocols that are secure against auxiliary input leakage. An instantiation based on the generalized decisional Diffie-Hellman (GDDH) assumption in the standard model is also given to demonstrate the feasibility of our proposed framework. We also give a comparison among the existing leakage resilient AKE protocols with auxiliary inputs.<\/jats:p>","DOI":"10.1093\/comjnl\/bxab046","type":"journal-article","created":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T19:07:59Z","timestamp":1617476879000},"page":"2063-2072","source":"Crossref","is-referenced-by-count":0,"title":["eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage"],"prefix":"10.1093","volume":"65","author":[{"given":"Sujuan","family":"Li","sequence":"first","affiliation":[{"name":"School of Physical and Mathematical Sciences , Nanjing Tech University, Nanjing 211816, China"}]},{"given":"Futai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fujian Provincial Key Laboratory of Network Security and Cryptography , College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China"}]}],"member":"286","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"volume-title":"Entity Authentication Mechanisms-Part3: Entity Authentication Using Asymmetric Techniques","year":"1993","author":"ISO\/IEC 9789-3","key":"2022081612371007300_ref1"},{"key":"2022081612371007300_ref2","first-page":"400","volume-title":"SIGMA: The Sign-and-Mac Approach to Authenticated Diffie-Hellman and Its Use in the Ike-Protocols. Advances in Cryptology-CRYPTO 2003, Santa Barbara, California, USA, August 17-21","author":"Krawczyk","year":"2003"},{"key":"2022081612371007300_ref3","first-page":"232","volume-title":"Entity Authentication and Key Distribution. Advances in Cryptology-CRYPTO\u201993, Santa Barbara, California, USA, August 22-26","author":"Mihir","year":"1993"},{"key":"2022081612371007300_ref4","first-page":"385","volume-title":"2-Pass Key Exchange Protocols from CPA-Secure KEM. CT-RSA 2014, San Francisco, CA, USA, April 20-24","author":"Kaoru","year":"2014"},{"volume-title":"Analysis of key-exchange protocols and their use for building secure channels","year":"2001","author":"Ran","key":"2022081612371007300_ref5"},{"key":"2022081612371007300_ref6","first-page":"419","volume-title":"Modular Approach to the Design and Analysis of Key Exchange Protocols. ACM STOC 1998, Dallas, Texas, May 23-26","author":"Mihir","year":"1998"},{"key":"2022081612371007300_ref7","first-page":"231","article-title":"Number-theoretic constructions of efficient pseudo-random functions. J","volume":"51","author":"Moni","year":"2004","journal-title":"ACM 2014"},{"key":"2022081612371007300_ref8","first-page":"585","volume-title":"Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005, Chennai, India, December 4-8","author":"Choo","year":"2005"},{"key":"2022081612371007300_ref9","first-page":"1","volume-title":"Stronger Security of Authenticated Key Exchange. ProvSec 2007, Wollongong, Australia, November 1-2","author":"LaMacchia","year":"2007"},{"key":"2022081612371007300_ref10","first-page":"361","volume-title":"Public-Key Encryption Schemes With Auxiliary Inputs. TCC 2010, Zurich, Switzerland, February 9-11","author":"Dodis","year":"2010"},{"key":"2022081612371007300_ref11","first-page":"36","volume-title":"Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. CRYPTO 2009, Santa Barbara, California, USA, August 16-20","author":"Joel","year":"2009"},{"key":"2022081612371007300_ref12","first-page":"361","volume-title":"Public-Key Encryption Schemes With Auxiliary Inputs. TCC 2010, Zurich, Switzerland, February 9-11","author":"Yevgeniy","year":"2010"},{"key":"2022081612371007300_ref13","first-page":"441","volume-title":"Leakage Resilient eCK-Secure Key Exchange Protocol Without Random Oracles. ACM ASIACCS 2011, Hongkong, March 22-24","author":"Daisuke","year":"2011"},{"key":"2022081612371007300_ref14","first-page":"467","volume-title":"Strongly Secure Authenticated Key Exchange From Factoring, Codes, and Lattices. PKC 2012, May 21-23, Darmstadt, Germany","author":"Fujioka","year":"2012"},{"volume-title":"Signature Schemes Secure Against Hard-to-Invert Leakage. ASIACRYPT 2012, December 2-6 Bejing, China, pp. 98\u2013115","year":"2012","author":"Faust","key":"2022081612371007300_ref15"},{"volume-title":"EUROCRYPT 2012. LNCS (Vol. 7237), pp. 209\u2013227","year":"2012","author":"Hofheinz","key":"2022081612371007300_ref16"},{"key":"2022081612371007300_ref17","first-page":"520","volume-title":"EUROCRYPT 2013. LNCS (Vol. 7881)","author":"Hofheinz","year":"2013"},{"key":"2022081612371007300_ref18","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s10586-013-0253-z","article-title":"Efficient Leakage-Resilient Public Key Encryption from DDH Assumption","volume":"16","author":"Li","year":"2013","journal-title":"Cluster Comput."},{"key":"2022081612371007300_ref19","first-page":"204","volume-title":"Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. ISPEC 2013, Lanzhou, China, May 12-14","author":"Yang","year":"2013"},{"key":"2022081612371007300_ref20","first-page":"19","volume-title":"Leakage-Flexible CCA-Secure Public-Key Encryption: Simple Construction and Free of Pairing. Public Key Cryptography 2014, Buenos Aires, Argentina, March 26-28","author":"Qin","year":"2014"},{"key":"2022081612371007300_ref21","first-page":"130","volume-title":"Identity-Based Encryption With Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS 2014, Wroclaw, Poland, September","author":"Yuen","year":"2014"},{"key":"2022081612371007300_ref22","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1093\/comjnl\/bxt105","article-title":"Functional encryption resilient to hard-to-invert leakage","volume":"58","author":"Zhang","year":"2015","journal-title":"Comp. J."},{"key":"2022081612371007300_ref23","first-page":"19","volume-title":"Strongly Leakage-Resilient Authenticated Key Exchange CT-RSA 2016, February 29-March 4, San Francisco, CA, USA","author":"Chen","year":"2016"},{"key":"2022081612371007300_ref24","first-page":"2823","article-title":"Security Analysis and Improvement of CCA Secure PKE with (Continual) Auxiliary Input","volume":"2017","author":"Li","year":"2017","journal-title":"Chin. J. Comp."},{"key":"2022081612371007300_ref25","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10623-016-0295-3","article-title":"Strong authenticated key exchange with auxiliary inputs","volume":"85","author":"Chen","year":"2017","journal-title":"Des. Codes Cryptography"},{"key":"2022081612371007300_ref26","doi-asserted-by":"crossref","first-page":"38","DOI":"10.3390\/info8020038","article-title":"Continuous Leakage Resilient Lossy Trapdoor Functions","volume":"8","author":"Li","year":"2017","journal-title":"Information"},{"key":"2022081612371007300_ref27","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1093\/comjnl\/bxy003","article-title":"Continuous leakage-resilient identity-based encryption without random oracles","volume":"61","author":"Zhou","year":"2018","journal-title":"Comp. J."},{"key":"2022081612371007300_ref28","first-page":"266","article-title":"Certificate-based Smooth Projective Hashing and Its Applications","volume":"20","author":"Li","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"2022081612371007300_ref29","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.ins.2018.07.077","article-title":"Key-policy attribute-based encryption against continual auxiliary input leakage","volume":"470","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"key":"2022081612371007300_ref30","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1093\/comjnl\/bxz085","article-title":"Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings","volume":"63","author":"Zhou","year":"2020","journal-title":"Comp. J."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/8\/2063\/45329633\/bxab046.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/8\/2063\/45329633\/bxab046.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T12:38:23Z","timestamp":1660653503000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/65\/8\/2063\/6269133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":30,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,5,8]]},"published-print":{"date-parts":[[2022,8,11]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxab046","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2022,8]]},"published":{"date-parts":[[2021,5,8]]}}}