Password-Authenticated Key Exchange from Group Actions

被引:17
|
作者
Abdalla, Michel [1 ,2 ]
Eisenhofer, Thorsten [3 ]
Kiltz, Eike [3 ]
Kunzweiler, Sabrina [3 ]
Riepel, Doreen [3 ]
机构
[1] DFINITY, Zurich, Switzerland
[2] PSL Univ, CNRS, DIENS, Ecole Normale Super, Paris, France
[3] Ruhr Univ Bochum, Bochum, Germany
来源
关键词
Password-authenticated key exchange; group actions; CSIDH; FRAMEWORK; SECURE;
D O I
10.1007/978-3-031-15979-4_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two provably secure password-authenticated key exchange (PAKE) protocols based on a commutative group action. To date the most important instantiation of isogeny-based group actions is given by CSIDH. To model the properties more accurately, we extend the framework of cryptographic group actions (Alamati et al., ASIACRYPT 2020) by the ability of computing the quadratic twist of an elliptic curve. This property is always present in the CSIDH setting and turns out to be crucial in the security analysis of our PAKE protocols. Despite the resemblance, the translation of Diffie-Hellman based PAKE protocols to group actions either does not work with known techniques or is insecure ("How not to create an isogeny-based PAKE", Azarderakhsh et al., ACNS 2020). We overcome the difficulties mentioned in previous work by using a "bit-by-bit" approach, where each password bit is considered separately. Our first protocol X-GA-PAKE(l) can be executed in a single round. Both parties need to send two set elements for each password bit in order to prevent offline dictionary attacks. The second protocol Com-GA-PAKE(l) requires only one set element per password bit, but one party has to send a commitment on its message first. We also discuss different optimizations that can be used to reduce the computational cost. We provide comprehensive security proofs for our base protocols and deduce security for the optimized versions.
引用
收藏
页码:699 / 728
页数:30
相关论文
共 50 条
  • [31] The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols
    Eaton, Edward
    Stebila, Douglas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 154 - 173
  • [32] Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange
    Nam, Junghyun
    Paik, Juryon
    Won, Dongho
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 865 - 868
  • [33] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [34] Password-authenticated key exchange between clients with different passwords
    Byun, JW
    Jeong, IR
    Lee, DH
    Park, CS
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 134 - 146
  • [35] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [36] Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange
    Hanai, Shuya
    Tanaka, Keisuke
    Tezuka, Masayuki
    Yoshida, Yusuke
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT II, SCN 2024, 2024, 14974 : 272 - 293
  • [37] Password-Authenticated Multiple Key Exchange Protocol for Mobile Applications
    Li Wenmin
    Wen Qiaoyan
    Su Qi
    Zhang Hua
    Jin Zhengping
    CHINA COMMUNICATIONS, 2012, 9 (01) : 64 - 72
  • [38] Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes
    Bootle, Jonathan
    Faller, Sebastian
    Hesse, Julia
    Hostakova, Kristina
    Ottenhues, Johannes
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT VIII, 2023, 14445 : 110 - 142
  • [39] Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
    Abdalla, Michel
    Catalano, Dario
    Chevalier, Celine
    Pointcheval, David
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 254 - +
  • [40] PASSWORD-AUTHENTICATED GROUP KEY ESTABLISHMENT FROM SMOOTH PROJECTIVE HASH FUNCTIONS
    Bohli, Jens-Matthias
    Gonzalez Vasco, Maria Isabel
    Steinwandt, Rainer
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2019, 29 (04) : 797 - 815