UC-secure Two-Server Password-Based Authentication Protocol and Its Applications

被引:5
|
作者
Zhang, Lin [1 ]
Zhang, Zhenfeng [1 ]
Hu, Xuexian [2 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
关键词
Universal composability; two-server password-based authentication; key exchange; secret sharing;
D O I
10.1145/2897845.2897872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-server password-based authentication (2PA) protocol is a special kind of authentication primitive that provides additional protection for the user's password. Through a 2PA protocol, a user can distribute his low-entropy password between two authentication servers in the initialization phase and authenticate himself merely via a matching password in the login phase. No single server can learn any information about the user's password, nor impersonate the legitimate user to authenticate to the honest server. In this paper, we first formulate and realize the security definition of two-server password-based authentication in the well-known universal composability (UC) framework, which thus provides desirable properties such as composable security. We show that our construction is suitable for the asymmetric communication model in which one server acts as the front-end server interacting directly with the user and the other stays backstage. Then, we show that our protocol could be easily extended to more complicate password-based cryptographic protocols such as two-server password-authenticated key exchange (2PAKE) and two-server password-authenticated secret sharing (2PASS), which enjoy stronger security guarantees and better efficiency performances in comparison with the existing schemes
引用
收藏
页码:153 / 164
页数:12
相关论文
共 50 条
  • [1] Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
    Camenisch, Jan
    Enderlein, Robert R.
    Neven, Gregory
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 283 - 307
  • [2] A practical password-based two-server authentication and key exchange system
    Yang, YJ
    Deng, RH
    Bao, F
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) : 105 - 114
  • [3] Proofs for two-server password authentication
    Szydlo, M
    Kaliski, B
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 227 - 244
  • [4] A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 325 - 329
  • [5] SSO password-based multi-server authentication protocol
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (1-2) : 161 - 180
  • [6] A Threshold Multi-Server Protocol for Password-Based Authentication
    Guan, Mengxiang
    Song, Jiaxing
    Liu, Weidong
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 108 - 118
  • [7] Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
    Blazy, Olivier
    Chevalier, Celine
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 3 - 18
  • [8] Secure password-based authentication in WLAN
    Keshava, M.
    Journal of the Indian Institute of Science, 2006, 86 (04) : 389 - 396
  • [9] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [10] Provably secure quantum resistance two-server password-authenticated key exchange protocol
    Yin A.
    Guo Y.
    Wang D.
    Qu T.
    Chen L.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 14 - 29