Secure Authentication from a Weak Key, without Leaking Information

被引:0
|
作者
Bouman, Niek J. [1 ]
Fehr, Serge [1 ]
机构
[1] CWI, NL-1009 AB Amsterdam, Netherlands
来源
关键词
QUANTUM; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. This problem has recently received considerable attention, with different solutions optimizing different parameters. We study the problem in an extended setting, where the weak key is a one-time session key that is derived from a public source of randomness with the help of a (potentially also weak) long-term key. Our goal now is to authenticate a message by means of the weak session key in such a way that (nearly) no information on the long-term key is leaked. Ensuring privacy of the long-term key is vital for the long-term key to be re-usable. Previous work has not considered such a privacy issue, and previous solutions do not seem to satisfy this requirement. We show the existence of a practical four-round protocol that provides message authentication from a weak session key and that avoids non-negligible leakage on the long-term key. The security of our scheme also holds in the quantum setting where the adversary may have limited quantum side information on the weak session key. As an application of our scheme, we show the existence of an identification scheme in the bounded quantum storage model that is secure against a man-in-the-middle attack and that is truly password-based: it does not need any high entropy key, in contrast to the scheme proposed by Damgard et al.
引用
收藏
页码:246 / 265
页数:20
相关论文
共 50 条
  • [1] Shared authentication token secure against replay and weak key attacks
    Yen, SM
    Liao, KH
    [J]. INFORMATION PROCESSING LETTERS, 1997, 62 (02) : 77 - 80
  • [2] Secure Computation with Information Leaking to an Adversary
    Ajtai, Miklos
    [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 715 - 724
  • [3] Comparing information without leaking it
    Fagin, R
    Naor, M
    Winkler, P
    [J]. COMMUNICATIONS OF THE ACM, 1996, 39 (05) : 77 - 85
  • [4] Composable, Unconditionally Secure Message Authentication without any Secret Key
    Ostrev, Dimiter
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 622 - 626
  • [5] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281
  • [6] Secure Computation Without Authentication
    Boaz Barak
    Ran Canetti
    Yehuda Lindell
    Rafael Pass
    Tal Rabin
    [J]. Journal of Cryptology, 2011, 24 : 720 - 760
  • [7] Secure computation without authentication
    Barak, B
    Canetti, R
    Lindell, Y
    Pass, R
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 361 - 377
  • [8] Secure Computation Without Authentication
    Barak, Boaz
    Canetti, Ran
    Lindell, Yehuda
    Pass, Rafael
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 720 - 760
  • [9] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
    Seito, Takenobu
    Aikawa, Tadashi
    Shikata, Junji
    Matsumoto, Tsutomu
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
  • [10] Pairwise key setup and authentication utilizing deployment information for secure sensor network
    Doh, Inshil
    Park, Jung-Min
    Chae, Kijoon
    [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 280 - 289