Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes

被引:2
|
作者
Bootle, Jonathan [1 ]
Faller, Sebastian [1 ,2 ]
Hesse, Julia [1 ]
Hostakova, Kristina [2 ]
Ottenhues, Johannes [3 ]
机构
[1] IBM Res Europe Zurich, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Univ St Gallen, St Gallen, Switzerland
基金
瑞士国家科学基金会;
关键词
Attacks on Public-Key Constructions; Key Exchange Protocols; Password-Based Cryptography; UC Framework; SECURE COMPUTATION;
D O I
10.1007/978-981-99-8742-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic keys to be generated from authentication data that is both fuzzy and of low entropy. The strong protection against offline attacks offered by fuzzy PAKE opens an interesting avenue towards secure biometric authentication, typo-tolerant password authentication, and automated IoT device pairing. Previous constructions of fuzzy PAKE are either based on Error Correcting Codes (ECC) or generic multi-party computation techniques such as Garbled Circuits. While ECC-based constructions are significantly more efficient, they rely on multiple special properties of error correcting codes such as maximum distance separability and smoothness. We contribute to the line of research on fuzzy PAKE in two ways. First, we identify a subtle but devastating gap in the security analysis of the currently most efficient fuzzy PAKE construction (Dupont et al., Eurocrypt 2018), allowing a man-in-the-middle attacker to test individual password characters. Second, we provide a new fuzzy PAKE scheme based on ECC and PAKE that provides a built-in protection against individual password character guesses and requires fewer, more standard properties of the underlying ECC. Additionally, our construction offers better error correction capabilities than previous ECC-based fuzzy PAKEs.
引用
收藏
页码:110 / 142
页数:33
相关论文
共 50 条
  • [41] ID2S Password-Authenticated Key Exchange Protocols
    Yi, Xun
    Rao, Fang-Yu
    Tari, Zahir
    Hao, Feng
    Bertino, Elisa
    Khalil, Ibrahim
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (12) : 3687 - 3701
  • [42] Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11): : 2092 - 2095
  • [43] Security of the J-PAKE Password-Authenticated Key Exchange Protocol
    Abdalla, Michel
    Benhamouda, Fabrice
    MacKenzie, Philip
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 571 - 587
  • [44] A Secure Two-Party Password-Authenticated Key Exchange Protocol
    Saeed, Maryam
    Shahhoseini, Hadi Shahriar
    Mackvandi, Ali
    Rezaeinezhad, Mohammad Reza
    Naddafiun, Mansour
    Bidoki, Mohammad Zare
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 466 - 474
  • [45] Hierarchical group password-authenticated key exchange based on bilinear pairing
    Liu, Xiu-Mei
    Gao, Ke-Ning
    Chang, Gui-Ran
    Tongxin Xuebao/Journal on Communications, 2010, 31 (06): : 44 - 48
  • [46] A secure password-authenticated key exchange between clients with different passwords
    Yoon, EJ
    Yoo, KY
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 659 - 663
  • [47] Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
    Abdalla, Michel
    Izabachene, Malika
    Pointcheval, David
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 133 - 148
  • [48] Employing Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks
    Chuang, Po-Jen
    Liao, Yi-Ping
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2015, 18 (04): : 407 - 418
  • [49] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
  • [50] A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Soriente, Claudio
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1336 - 1353