Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

Based on users’ permanent private keys and ephemeral secret keys (randomness secret values), authenticated key agreement (AKA) protocols are used to construct a common session key between two session parties while authenticating each other. Recently, the design of leakage-resilient AKA (L...

Full description

Bibliographic Details
Main Authors: Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8272008/