Threshold password-authenticated key exchange

被引:32
|
作者
MacKenzie, P [1 ]
Shrimpton, T
Jakobsson, M
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Portland State Univ, Dept Comp Sci, Portland, OR 97207 USA
[3] Indiana Univ, Sch Informat, Bloomington, IN 47408 USA
关键词
password authentication; key exchange; threshold cryptosystems; dictionary attack;
D O I
10.1007/s00145-005-0232-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In most password-authenticated key exchange systems there is a single server storing password verification data. To provide some resilience against server compromise, this data typically takes the form of a one-way function of the password (and possibly a salt, or other public values) rather than the password itself. However, if the server is compromised, this password verification data can be used to perform an off-line dictionary attack on the user's password. In this paper we propose an efficient password-authenticated key exchange system involving a set of servers with known public keys, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that threshold of servers does not allow an attacker to perform an off-line dictionary attack. We prove our system is secure in the random oracle model under the Decision Diffie-Hellman assumption against an attacker that may eavesdrop on, insert, delete, or modify messages between the user and servers, and that compromises fewer than that threshold of servers.
引用
收藏
页码:27 / 66
页数:40
相关论文
共 50 条
  • [31] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167
  • [32] Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications
    Li Wenmin
    Wen Qiaoyan
    Su Qi
    Zhang Hua
    Jin Zhengping
    CHINA COMMUNICATIONS, 2012, 9 (01) : 64 - 72
  • [33] ID-Based Group Password-Authenticated Key Exchange
    Yi, Xun
    Tso, Raylin
    Okamoto, Eijo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 192 - +
  • [34] UC-secure and Contributory Password-Authenticated Group Key Exchange
    Zhang, Lin
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 119 - 134
  • [35] Improved client-to-client password-authenticated key exchange protocol
    Gang, Yao
    Dengguo, Feng
    Xiaoxi, Han
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 564 - +
  • [36] Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 102 - 115
  • [37] An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
    Wei, Fushan
    Ma, Jianfeng
    Zhang, Ruijie
    Ma, Chuangui
    Wang, Xuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (07)
  • [38] The relationship between password-authenticated key exchange and other cryptographic primitives
    Nguyen, MH
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 457 - 475
  • [39] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [40] Smart Grid Multilayer Consensus Password-Authenticated Key Exchange Protocol
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,