An optimal round two-party password-authenticated key agreement protocol

被引:0
|
作者
Strangio, Maurizio A. [1 ]
机构
[1] Univ Roma Tor Vergata, Dept Comp Sci Syst & Prod, I-00173 Rome, Italy
关键词
D O I
10.1109/ARES.2006.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key agreement protocols constitute one of the most valuable cryptographic primitives since they allow two (or more) users to setup a private and authenticated communication channel over a public network. This paper is concerned with key agreement protocols in the symmetric trust model, wherein the shared key is a password. This setting is very appealing from the user's perspective since two parties, in principle, can easily agree on a shared password beforehand (e.g. on the telephone). However designing such protocols represents an interesting challenge since there is no standard way of choosing a password that achieves an optimum trade-off between usability and security. Indeed, passwords belonging to a highly structured language (including PINs - Personal Identification Numbers) are essentially equivalent to low entropy strings. A fundamental goal is that of obtaining secure and efficient protocols, with optimum computational complexity, round complexity and communication efficiency. These properties make them ideal candidates for mobile devices. We present a new construction (DH-BPAKE) based on the encrypted key exchange protocol of Bellovin and Merritt augmented with an efficient key confirmation round. The communication model is asynchronous, meaning that each party can simultaneously send a message to the other party. In addition, we formally prove security in a modified version of the model of Boyko et al. (which is based on the model of Shoup).
引用
下载
收藏
页码:216 / 223
页数:8
相关论文
共 50 条