Janaka Alawatugoda
University of Peradeniya
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Janaka Alawatugoda.
australasian conference on information security and privacy | 2014
Janaka Alawatugoda; Colin Boyd; Douglas Stebila
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
IACR Cryptology ePrint Archive | 2015
Janaka Alawatugoda; Douglas Stebila; Colin Boyd
Security models for two-party authenticated key exchange AKE protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage
international conference on industrial and information systems | 2011
Janaka Alawatugoda; Darshana Jayasinghe; Roshan G. Ragel
international conference on industrial and information systems | 2013
Udyani Herath; Janaka Alawatugoda; Roshan G. Ragel
\mathrm {eCK}
International Journal of Information Security | 2017
Janaka Alawatugoda
financial cryptography | 2015
Janaka Alawatugoda; Douglas Stebila; Colin Boyd
provable security | 2017
Suvradip Chakraborty; Janaka Alawatugoda; C. Pandu Rangan
Journal of Mathematical Cryptology | 2017
Janaka Alawatugoda
\mathrm {CAFL\text {-}eCK}
international conference on information and automation | 2016
Janaka Alawatugoda; Roshan G. Ragel; Danushka Eranga; Nalaka Jayanath; Chinthaka Somathilaka
Institute for Future Environments; Science & Engineering Faculty | 2015
Janaka Alawatugoda; Douglas Stebila; Colin Boyd
model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the