Threshold password-authenticated key exchange

被引:32
|
作者
MacKenzie, P [1 ]
Shrimpton, T
Jakobsson, M
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Portland State Univ, Dept Comp Sci, Portland, OR 97207 USA
[3] Indiana Univ, Sch Informat, Bloomington, IN 47408 USA
关键词
password authentication; key exchange; threshold cryptosystems; dictionary attack;
D O I
10.1007/s00145-005-0232-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In most password-authenticated key exchange systems there is a single server storing password verification data. To provide some resilience against server compromise, this data typically takes the form of a one-way function of the password (and possibly a salt, or other public values) rather than the password itself. However, if the server is compromised, this password verification data can be used to perform an off-line dictionary attack on the user's password. In this paper we propose an efficient password-authenticated key exchange system involving a set of servers with known public keys, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that threshold of servers does not allow an attacker to perform an off-line dictionary attack. We prove our system is secure in the random oracle model under the Decision Diffie-Hellman assumption against an attacker that may eavesdrop on, insert, delete, or modify messages between the user and servers, and that compromises fewer than that threshold of servers.
引用
收藏
页码:27 / 66
页数:40
相关论文
共 50 条
  • [21] Password-Authenticated Key Exchange from Group Actions
    Abdalla, Michel
    Eisenhofer, Thorsten
    Kiltz, Eike
    Kunzweiler, Sabrina
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 699 - 728
  • [22] Research on password-authenticated key exchange protocol over lattices
    Guo Y.
    Yin A.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187
  • [23] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [24] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151
  • [25] Cryptanalysis of some improved password-authenticated key exchange schemes
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Wong, Kah-Hoong
    COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2822 - 2829
  • [26] The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols
    Eaton, Edward
    Stebila, Douglas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 154 - 173
  • [27] Password-authenticated key exchange between clients with different passwords
    Byun, JW
    Jeong, IR
    Lee, DH
    Park, CS
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 134 - 146
  • [28] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [29] Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange
    Hanai, Shuya
    Tanaka, Keisuke
    Tezuka, Masayuki
    Yoshida, Yusuke
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT II, SCN 2024, 2024, 14974 : 272 - 293
  • [30] Contributory Password-Authenticated Group Key Exchange with Join Capability
    Abdalla, Michel
    Chevalier, Celine
    Granboulan, Louis
    Pointcheval, David
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 142 - +