Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol

被引:0
|
作者
Yin A.-Q. [1 ]
Wang D. [2 ,3 ]
Guo Y.-B. [1 ]
Chen L. [1 ]
Tang D. [1 ]
机构
[1] College of Electronic Technology, Information Engineering University, Zhengzhou
[2] College of Cyber Science, Nankai University, Tianjin
[3] Tianjin Key Laboratory of Network and Data Security Technology (Nankai University), Tianjin
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2022年 / 45卷 / 11期
基金
中国国家自然科学基金;
关键词
Additive homomorphism; Efficient; Password-authenticated key exchange; Provably secure; Quantum resistance; Word-independent smooth projective hash function;
D O I
10.11897/SP.J.1016.2022.02321
中图分类号
学科分类号
摘要
Password-Authenticated Key Exchange(PAKE) protocol has a wide application prospect in the coming post-quantum era. Scaling down the number of communication rounds is capable of effectively improving the execution efficiency, and this is a rather important direction for optimizing PAKE protocols over lattices. Up to now, there are mainly two technical routes in the existing literature guiding the construction of low-round PAKE schemes over lattices. One is based on Non-Interactive Zero-Knowledge(NIZK) proofs, but how to implement NIZK proofs in the standard model over lattices is still an open question for these derivative schemes; the other one is nominally designed as Indistinguishability under Adaptive Chosen-Ciphertext Attack(IND-CCA2) secure based protocol, nevertheless it applies only an Indistinguishability under Chosen-Ciphertext Attack(IND-CCA1) secure based Public Key Encryption(PKE) scheme in implementation, which relies on the introduction of signature/verification algorithms or other techniques to ensure its security in implementation. Moreover, these two methods will introduce extra computation and communication costs. Therefore, taking advantage of the additive homomorphic property of the Learning with Errors(LWE) problem, this paper proposes an IND-CCA2 secure word-independent Smooth Projective Hash Function(SPHF) over lattices, which also supports the construction of one-round PAKE protocols. And this paper identifies the exact values of parameters of the PKE scheme that the proposed SPHF predicates on, ultimately eliminate the influence of the incomplete additive homomorphic property of the LWE problem on the correctness of the SPHF. As far as we know, so mentioned function is the first IND-CCA2 secure word-independent SPHF over lattices. Besides, the proposed SPHF possesses independent research value and great application potential in multiple practice fields such as witness encryption, zero-knowledge proof, oblivious transmission and so on. On this basis, this paper innovatively designs an efficient provably secure PAKE protocol. This protocol is resistant to quantum attack; it only requires one-round communication, achieving the optimal communication round; it is based on the standard model, thus capable of avoiding the potential security threats of utilizing random oracles, especially in situations where the utilize of random oracles may cause lattice-based PAKE protocols to suffer offline password guessing attacks and quantum attacks. In practical applications, the proposed protocol does not reflect dependence on the utilization of NIZK proofs, signature/verification algorithms or other techniques to ensure its security, which will effectively improve the execution efficiency. In addition, this paper utilizes a dataset containing 4.74 million unique username-password pairs of Renren to verify that the PAKE security analysis model based on the CDF-Zipf law is indubitable feasible to more accurately evaluate the security guarantee that a real PAKE protocol can provide. Finally, in the standard model and based on this more realistic security analysis model, this paper provides a strict proof of the security of above mentioned protocol. Controlled experimental results show that the proposed PAKE protocol has the most optimal efficiency and the lowest communication cost compared with other related protocols, which drops in line with our expectations. © 2022, Science Press. All right reserved.
引用
收藏
页码:2321 / 2336
页数:15
相关论文
共 39 条
  • [1] Shin J S, Jo M, Hwang J Y, Et al., A verifier-based password-authenticated key exchange using tamper-proof hardware, The Computer Journal, 64, 8, pp. 1293-1302, (2021)
  • [2] Wang Ding, Research on Key Issues in Password Security, (2017)
  • [3] Nahar M N, Alsadoon A, Prasad P, Et al., An enhanced one-time password with biometric authentication for mixed reality surgical tele-presence, Multimedia Tools and Applications, 80, 7, pp. 10075-10100, (2021)
  • [4] Groce A, Katz J., A new framework for efficient password-based authenticated key exchange, Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 516-525, (2010)
  • [5] Katz J, Ostrovsky R, Yung M., Efficient and secure authenticated key exchange using weak passwords, Journal of the ACM, 57, 1, pp. 1-39, (2009)
  • [6] Gennaro R, Lindell Y., A framework for password-based authenticated key exchange, ACM Transactions on Information and System Security, 9, 2, pp. 181-234, (2006)
  • [7] Jiang S, Gong G., Password based key exchange with mutual authentication, Proceedings of the International Workshop on Selected Areas in Cryptography, pp. 267-279, (2004)
  • [8] Regev O., Lattice-based cryptography, Proceedings of the 26th Annual International Cryptology Conference, pp. 131-141, (2006)
  • [9] Peikert C., A decade of lattice cryptography, in Theoretical Computer Science, 10, 4, pp. 283-424, (2016)
  • [10] Yousuf H, Lahzi M, Salloum S A, Et al., Systematic review on fully homomorphic encryption scheme and its application, Recent Advances in Intelligent Systems and Smart Applications, 295, pp. 537-551, (2021)