[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 12, Issue 1 (9-2023) ::
منادی 2023, 12(1): 65-49 Back to browse issues page
Review of the security models with emphasis on leakage-resilient key exchange protocols
Nasser Zarbi , Ali Zaeembashi * , Nasour Bagheri
Department of Science, Shahid Rajaee Teacher Training University, Tehran, Iran
Abstract:   (643 Views)
Leakage-resilient cryptography aims to design key exchange protocols to withstand leakage attacks. These protocols are examined using a leakage-resilient security model to determine whether they possess the claimed security properties. The security analysis focuses on how the leakage-resilient security model has evolved to meet increasing security requirements and cover a broader range of attacks. By studying and analyzing the presented security properties of these models, potential vulnerabilities in protocol design can be effectively addressed. This article delves into various leakage-resilient security models based on two models, CK and eCK, and provides examples of secure key exchange protocols defined within these models. Additionally, it explores the relationship between adversaries' capabilities in these models and different attack schemes in the real world. By offering insights into various leakage-resilient security models, leakage attacks, and the development of secure protocols, it contributes to advancing knowledge in this field.
Keywords: Key exchange protocol, Leakage-resilient, Security model, Adversary
Full-Text [PDF 1027 kb]   (291 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2023/12/16 | Accepted: 2024/02/20 | Published: 2024/03/13
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Zarbi N, Zaeembashi A, Bagheri N. Review of the security models with emphasis on leakage-resilient key exchange protocols. منادی 2023; 12 (1) :65-49
URL: http://monadi.isc.org.ir/article-1-261-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 12, Issue 1 (9-2023) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 39 queries by YEKTAWEB 4660