OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks

被引:93
|
作者
Jarecki, Stanislaw [1 ]
Krawczyk, Hugo [2 ]
Xu, Jiayu [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92717 USA
[2] IBM Res, Yorktown Hts, NY USA
关键词
KEY-EXCHANGE;
D O I
10.1007/978-3-319-78372-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to establish a shared key in a way that is immune to offline attacks. Asymmetric PAKE (aPAKE) strengthens this notion for the more common client-server setting where the server stores a mapping of the password and security is required even upon server compromise, that is, the only allowed attack in this case is an (inevitable) offline exhaustive dictionary attack against individual user passwords. Unfortunately, most suggested aPAKE protocols (that dispense with the use of servers' public keys) allow for pre-computation attacks that lead to the instantaneous compromise of user passwords upon server compromise, thus forgoing much of the intended aPAKE security. Indeed, these protocols use- in essential ways- deterministic password mappings or use random "salt" transmitted in the clear from servers to users, and thus are vulnerable to pre-computation attacks. We initiate the study of Strong aPAKE protocols that are secure as aPAKE's but are also secure against pre-computation attacks. We formalize this notion in the Universally Composable (UC) settings and present two modular constructions using an Oblivious PRF as a main tool. The first builds a Strong aPAKE from any aPAKE (which in turn can be constructed from any PAKE [ 8]) while the second builds a Strong aPAKE from any authenticated key-exchange protocol secure against reverse impersonation (a.k.a. KCI). Using the latter transformation, we show a practical instantiation of a UC-secure Strong aPAKE in the Random Oracle model. The protocol ("OPAQUE") consists of 2 messages (3 with mutual authentication), requires 3 and 4 exponentiations for server and client, respectively (2 to 4 of which can be fixed-base depending on optimizations), provides forward secrecy, is PKI-free, supports user-side hash iterations, and allows a user-transparent server-side threshold implementation.
引用
收藏
页码:456 / 486
页数:31
相关论文
共 37 条
  • [1] Provably Secure Asymmetric PAKE Protocol for Protecting IoT Access
    Qi, Mingping
    Hu, Wei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7071 - 7078
  • [2] Secure Outsourcing Algorithm for Bilinear Pairings Without Pre-computation
    Tong, Le
    Yu, Jia
    Zhang, Hanlin
    [J]. 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 134 - 140
  • [3] A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
    Liu, Xin
    Kong, Jianwei
    Peng, Lu
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Liu, Xiaomeng
    [J]. MATHEMATICS, 2023, 11 (23)
  • [4] A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation
    Nohara, Yasunobu
    Inoue, Sozo
    [J]. WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 65 - 74
  • [5] Secure Computation Protocol of Text Similarity against Malicious Attacks for Text Classification in Deep-Learning Technology
    Liu, Xin
    Wang, Ruxue
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Xiong, Neal
    Liu, Xiaomeng
    [J]. ELECTRONICS, 2023, 12 (16)
  • [6] Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks
    Keshtkarjahromi, Yasaman
    Bitar, Rawad
    Dasari, Venkat
    El Rouayheb, Salim
    Seferoglu, Hulya
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [7] Secure Multi-Party Computation Protocol Using Asymmetric Encryption
    Shukla, Samiksha
    Sadashivappa, G.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 780 - 785
  • [8] A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks
    Babu, E. Suresh
    Nagaraju, C.
    Prasad, M. H. M. Krishna
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 339 - 344
  • [9] SeRWA: A secure routing protocol against wormhole attacks in sensor networks
    Madria, Sanjay
    Yin, Jian
    [J]. AD HOC NETWORKS, 2009, 7 (06) : 1051 - 1063
  • [10] HB++:: a lightweight authentication protocol secure against some attacks
    Bringer, Julien
    Chabanne, Herve
    Dottax, Emmanuelle
    [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 28 - +