Secure Authentication from a Weak Key, without Leaking Information

被引:0
|
作者
Bouman, Niek J. [1 ]
Fehr, Serge [1 ]
机构
[1] CWI, NL-1009 AB Amsterdam, Netherlands
来源
关键词
QUANTUM; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. This problem has recently received considerable attention, with different solutions optimizing different parameters. We study the problem in an extended setting, where the weak key is a one-time session key that is derived from a public source of randomness with the help of a (potentially also weak) long-term key. Our goal now is to authenticate a message by means of the weak session key in such a way that (nearly) no information on the long-term key is leaked. Ensuring privacy of the long-term key is vital for the long-term key to be re-usable. Previous work has not considered such a privacy issue, and previous solutions do not seem to satisfy this requirement. We show the existence of a practical four-round protocol that provides message authentication from a weak session key and that avoids non-negligible leakage on the long-term key. The security of our scheme also holds in the quantum setting where the adversary may have limited quantum side information on the weak session key. As an application of our scheme, we show the existence of an identification scheme in the bounded quantum storage model that is secure against a man-in-the-middle attack and that is truly password-based: it does not need any high entropy key, in contrast to the scheme proposed by Damgard et al.
引用
收藏
页码:246 / 265
页数:20
相关论文
共 50 条
  • [41] Secure RFID Authentication with Efficient Key-Lookup
    Akgun, Mete
    Caglayan, M. Ufuk
    Anarim, Emin
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4777 - +
  • [42] A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Lee, Tian-Fu
    Liu, Chuan-Ming
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
  • [43] A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Tian-Fu Lee
    Chuan-Ming Liu
    [J]. Journal of Medical Systems, 2013, 37
  • [44] From weak to strong information-theoretic key agreement
    Maurer, U
    Wolf, S
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 18 - 18
  • [45] Password authentication without the server public key
    Chang, YF
    Chang, CC
    Liu, YL
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3088 - 3091
  • [46] Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches
    Xiong, Wenjie
    Katzenbeisser, Stefan
    Szefer, Jakub
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (04) : 511 - 523
  • [47] Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
    Kim, Mijin
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 204 - 211
  • [48] A Secure Chameleon Hash Function without Key Exposure from Pairings
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 15 - 18
  • [49] Secure Methods for Fuzzy Key Binding in Biometric Authentication Applications
    Bui, Francis Minhthang
    Hatzinakos, Dimitrios
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1363 - 1367
  • [50] Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems
    Li, Jiping
    Zhang, Ning
    Ni, Jianbing
    Chen, Jing
    Du, Ruiying
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7334 - 7344