Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes

被引:2
|
作者
Bootle, Jonathan [1 ]
Faller, Sebastian [1 ,2 ]
Hesse, Julia [1 ]
Hostakova, Kristina [2 ]
Ottenhues, Johannes [3 ]
机构
[1] IBM Res Europe Zurich, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Univ St Gallen, St Gallen, Switzerland
基金
瑞士国家科学基金会;
关键词
Attacks on Public-Key Constructions; Key Exchange Protocols; Password-Based Cryptography; UC Framework; SECURE COMPUTATION;
D O I
10.1007/978-981-99-8742-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic keys to be generated from authentication data that is both fuzzy and of low entropy. The strong protection against offline attacks offered by fuzzy PAKE opens an interesting avenue towards secure biometric authentication, typo-tolerant password authentication, and automated IoT device pairing. Previous constructions of fuzzy PAKE are either based on Error Correcting Codes (ECC) or generic multi-party computation techniques such as Garbled Circuits. While ECC-based constructions are significantly more efficient, they rely on multiple special properties of error correcting codes such as maximum distance separability and smoothness. We contribute to the line of research on fuzzy PAKE in two ways. First, we identify a subtle but devastating gap in the security analysis of the currently most efficient fuzzy PAKE construction (Dupont et al., Eurocrypt 2018), allowing a man-in-the-middle attacker to test individual password characters. Second, we provide a new fuzzy PAKE scheme based on ECC and PAKE that provides a built-in protection against individual password character guesses and requires fewer, more standard properties of the underlying ECC. Additionally, our construction offers better error correction capabilities than previous ECC-based fuzzy PAKEs.
引用
收藏
页码:110 / 142
页数:33
相关论文
共 50 条
  • [1] Fuzzy Password-Authenticated Key Exchange
    Dupont, Pierre-Alain
    Hesse, Julia
    Pointcheval, David
    Reyzin, Leonid
    Yakoubov, Sophia
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 393 - 424
  • [2] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [3] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    Journal of Cryptology, 2006, 19 : 27 - 66
  • [4] Password-Authenticated Key Exchange from Group Actions
    Abdalla, Michel
    Eisenhofer, Thorsten
    Kiltz, Eike
    Kunzweiler, Sabrina
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 699 - 728
  • [5] Password-authenticated key exchange based on RSA
    MacKenzie, Philip
    Patel, Sarvar
    Swaminathan, Ram
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) : 387 - 410
  • [6] More efficient password-authenticated key exchange
    MacKenzie, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 361 - 377
  • [7] Faster and shorter password-authenticated key exchange
    Gennaro, Rosario
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 589 - 606
  • [8] Password-authenticated key exchange based on RSA
    Philip MacKenzie
    Sarvar Patel
    Ram Swaminathan
    International Journal of Information Security, 2010, 9 : 387 - 410
  • [9] Parallelizable password-authenticated key exchange protocol
    Lee, SW
    Yoo, KY
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 1014 - 1019
  • [10] Password-authenticated key exchange based on RSA
    MacKenzie, P
    Patel, S
    Swaminathan, R
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 599 - 613