Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes

被引:2
|
作者
Bootle, Jonathan [1 ]
Faller, Sebastian [1 ,2 ]
Hesse, Julia [1 ]
Hostakova, Kristina [2 ]
Ottenhues, Johannes [3 ]
机构
[1] IBM Res Europe Zurich, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Univ St Gallen, St Gallen, Switzerland
基金
瑞士国家科学基金会;
关键词
Attacks on Public-Key Constructions; Key Exchange Protocols; Password-Based Cryptography; UC Framework; SECURE COMPUTATION;
D O I
10.1007/978-981-99-8742-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic keys to be generated from authentication data that is both fuzzy and of low entropy. The strong protection against offline attacks offered by fuzzy PAKE opens an interesting avenue towards secure biometric authentication, typo-tolerant password authentication, and automated IoT device pairing. Previous constructions of fuzzy PAKE are either based on Error Correcting Codes (ECC) or generic multi-party computation techniques such as Garbled Circuits. While ECC-based constructions are significantly more efficient, they rely on multiple special properties of error correcting codes such as maximum distance separability and smoothness. We contribute to the line of research on fuzzy PAKE in two ways. First, we identify a subtle but devastating gap in the security analysis of the currently most efficient fuzzy PAKE construction (Dupont et al., Eurocrypt 2018), allowing a man-in-the-middle attacker to test individual password characters. Second, we provide a new fuzzy PAKE scheme based on ECC and PAKE that provides a built-in protection against individual password character guesses and requires fewer, more standard properties of the underlying ECC. Additionally, our construction offers better error correction capabilities than previous ECC-based fuzzy PAKEs.
引用
收藏
页码:110 / 142
页数:33
相关论文
共 50 条
  • [31] Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications
    Li Wenmin
    Wen Qiaoyan
    Su Qi
    Zhang Hua
    Jin Zhengping
    CHINA COMMUNICATIONS, 2012, 9 (01) : 64 - 72
  • [32] ID-Based Group Password-Authenticated Key Exchange
    Yi, Xun
    Tso, Raylin
    Okamoto, Eijo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 192 - +
  • [33] UC-secure and Contributory Password-Authenticated Group Key Exchange
    Zhang, Lin
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 119 - 134
  • [34] Improved client-to-client password-authenticated key exchange protocol
    Gang, Yao
    Dengguo, Feng
    Xiaoxi, Han
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 564 - +
  • [35] Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 102 - 115
  • [36] The relationship between password-authenticated key exchange and other cryptographic primitives
    Nguyen, MH
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 457 - 475
  • [37] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [38] Smart Grid Multilayer Consensus Password-Authenticated Key Exchange Protocol
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [39] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523
  • [40] Password-Authenticated Group Key Exchange: A Cross-Layer Design
    Zhang, Yuexin
    Xiang, Yang
    Huang, Xinyi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)