Threshold password-authenticated key exchange

被引:32
|
作者
MacKenzie, P [1 ]
Shrimpton, T
Jakobsson, M
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Portland State Univ, Dept Comp Sci, Portland, OR 97207 USA
[3] Indiana Univ, Sch Informat, Bloomington, IN 47408 USA
关键词
password authentication; key exchange; threshold cryptosystems; dictionary attack;
D O I
10.1007/s00145-005-0232-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In most password-authenticated key exchange systems there is a single server storing password verification data. To provide some resilience against server compromise, this data typically takes the form of a one-way function of the password (and possibly a salt, or other public values) rather than the password itself. However, if the server is compromised, this password verification data can be used to perform an off-line dictionary attack on the user's password. In this paper we propose an efficient password-authenticated key exchange system involving a set of servers with known public keys, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that threshold of servers does not allow an attacker to perform an off-line dictionary attack. We prove our system is secure in the random oracle model under the Decision Diffie-Hellman assumption against an attacker that may eavesdrop on, insert, delete, or modify messages between the user and servers, and that compromises fewer than that threshold of servers.
引用
收藏
页码:27 / 66
页数:40
相关论文
共 50 条
  • [41] Password-Authenticated Group Key Exchange: A Cross-Layer Design
    Zhang, Yuexin
    Xiang, Yang
    Huang, Xinyi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
  • [42] ID2S Password-Authenticated Key Exchange Protocols
    Yi, Xun
    Rao, Fang-Yu
    Tari, Zahir
    Hao, Feng
    Bertino, Elisa
    Khalil, Ibrahim
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (12) : 3687 - 3701
  • [43] Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11): : 2092 - 2095
  • [44] Security of the J-PAKE Password-Authenticated Key Exchange Protocol
    Abdalla, Michel
    Benhamouda, Fabrice
    MacKenzie, Philip
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 571 - 587
  • [45] A Secure Two-Party Password-Authenticated Key Exchange Protocol
    Saeed, Maryam
    Shahhoseini, Hadi Shahriar
    Mackvandi, Ali
    Rezaeinezhad, Mohammad Reza
    Naddafiun, Mansour
    Bidoki, Mohammad Zare
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 466 - 474
  • [46] Hierarchical group password-authenticated key exchange based on bilinear pairing
    Liu, Xiu-Mei
    Gao, Ke-Ning
    Chang, Gui-Ran
    Tongxin Xuebao/Journal on Communications, 2010, 31 (06): : 44 - 48
  • [47] An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
    Fushan WEI
    Jianfeng MA
    Ruijie ZHANG
    Chuangui MA
    Xuan WANG
    ScienceChina(InformationSciences), 2017, 60 (07) : 130 - 143
  • [48] A secure password-authenticated key exchange between clients with different passwords
    Yoon, EJ
    Yoo, KY
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 659 - 663
  • [49] Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
    Abdalla, Michel
    Izabachene, Malika
    Pointcheval, David
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 133 - 148
  • [50] Employing Secure and Efficient Password-Authenticated Key Exchange in Wireless Networks
    Chuang, Po-Jen
    Liao, Yi-Ping
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2015, 18 (04): : 407 - 418