Password-Authenticated Key Exchange from Group Actions

被引:17
|
作者
Abdalla, Michel [1 ,2 ]
Eisenhofer, Thorsten [3 ]
Kiltz, Eike [3 ]
Kunzweiler, Sabrina [3 ]
Riepel, Doreen [3 ]
机构
[1] DFINITY, Zurich, Switzerland
[2] PSL Univ, CNRS, DIENS, Ecole Normale Super, Paris, France
[3] Ruhr Univ Bochum, Bochum, Germany
来源
关键词
Password-authenticated key exchange; group actions; CSIDH; FRAMEWORK; SECURE;
D O I
10.1007/978-3-031-15979-4_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two provably secure password-authenticated key exchange (PAKE) protocols based on a commutative group action. To date the most important instantiation of isogeny-based group actions is given by CSIDH. To model the properties more accurately, we extend the framework of cryptographic group actions (Alamati et al., ASIACRYPT 2020) by the ability of computing the quadratic twist of an elliptic curve. This property is always present in the CSIDH setting and turns out to be crucial in the security analysis of our PAKE protocols. Despite the resemblance, the translation of Diffie-Hellman based PAKE protocols to group actions either does not work with known techniques or is insecure ("How not to create an isogeny-based PAKE", Azarderakhsh et al., ACNS 2020). We overcome the difficulties mentioned in previous work by using a "bit-by-bit" approach, where each password bit is considered separately. Our first protocol X-GA-PAKE(l) can be executed in a single round. Both parties need to send two set elements for each password bit in order to prevent offline dictionary attacks. The second protocol Com-GA-PAKE(l) requires only one set element per password bit, but one party has to send a commitment on its message first. We also discuss different optimizations that can be used to reduce the computational cost. We provide comprehensive security proofs for our base protocols and deduce security for the optimized versions.
引用
收藏
页码:699 / 728
页数:30
相关论文
共 50 条
  • [1] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [2] Fuzzy Password-Authenticated Key Exchange
    Dupont, Pierre-Alain
    Hesse, Julia
    Pointcheval, David
    Reyzin, Leonid
    Yakoubov, Sophia
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 393 - 424
  • [3] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    Journal of Cryptology, 2006, 19 : 27 - 66
  • [4] Compact Password Authenticated Key Exchange from Group Actions
    Ishibashi, Ren
    Yoneyama, Kazuki
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 220 - 247
  • [5] Contributory Password-Authenticated Group Key Exchange with Join Capability
    Abdalla, Michel
    Chevalier, Celine
    Granboulan, Louis
    Pointcheval, David
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 142 - +
  • [6] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167
  • [7] ID-Based Group Password-Authenticated Key Exchange
    Yi, Xun
    Tso, Raylin
    Okamoto, Eijo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 192 - +
  • [8] Password-authenticated key exchange based on RSA
    MacKenzie, Philip
    Patel, Sarvar
    Swaminathan, Ram
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (06) : 387 - 410
  • [9] UC-secure and Contributory Password-Authenticated Group Key Exchange
    Zhang, Lin
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 119 - 134
  • [10] More efficient password-authenticated key exchange
    MacKenzie, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 361 - 377