Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

被引:0
|
作者
Kobayashi, Yukou [1 ,7 ]
Yanai, Naoto [3 ]
Yoneyama, Kazuki [4 ]
Nishide, Takashi [1 ]
Hanaoka, Goichiro [5 ]
Kim, Kwangjo [6 ]
Okamoto, Eiji [2 ]
机构
[1] Univ Tsukuba, Tsukuba, Ibaraki 3058577, Japan
[2] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki 3058577, Japan
[3] Osaka Univ, Grad Sch Informat Sci & Technol, Dept Multimedia Engn, Suita, Osaka 5650871, Japan
[4] Ibaraki Univ, Cryptog, Hitachi, Ibaraki 3168511, Japan
[5] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki 3058560, Japan
[6] Korea Adv Inst Sci & Technol, Sch Comp, Daejeon, South Korea
[7] LAC Co Ltd, Tokyo, Japan
基金
新加坡国家研究基金会;
关键词
password-based authenticated key exchange (PAKE); threshold cryptography; DIFFIE-HELLMAN; PROTOCOL;
D O I
10.1587/transfun.E100.A.2991
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By using Password-based Authenticated Key Exchange (PAKE), a server can authenticate a user who has only the same password shared with the server in advance and establish a session key with the user simultaneously. However, in the real applications, we may have a situation where a user needs to share a session key with server A, but the authentication needs to be done by a different server B that shares the password with the user. Further, to achieve higher security on the server side, it may be required to make PAKE tolerant of a server breach by having multiple authentication servers. To deal with such a situation, Abdalla et al. proposed a variant of PAKE called Gateway Threshold PAKE (GTPAKE) where a gateway corresponds to the aforementioned server A being an online service provider and also a potential adversary that may try to guess the passwords. However, the schemes of Abdalla et al. turned out to be vulnerable to Undetectable On-line Dictionary Attack (UDonDA). In this paper, we propose the first GTPAKE provably secure against UDonDA, and in the security analysis, we prove that our GTPAKE is secure even if an adversary breaks into parts of multiple authentication servers.
引用
收藏
页码:2991 / 3006
页数:16
相关论文
共 50 条
  • [1] Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
    Kobayashi, Yukou
    Yanai, Naoto
    Yoneyama, Kazuki
    Nishide, Takashi
    Hanaoka, Goichiro
    Kim, Kwangjo
    Okamoto, Eiji
    [J]. 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 39 - 52
  • [2] Secure cross-realm client-to-client password-based authenticated key exchange against undetectable on-line dictionary attacks
    Yoneyama, Kazuki
    Ota, Haruki
    Ohta, Kazuo
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2007, 4851 : 257 - +
  • [3] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [4] Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks
    Chien, Hung-Yu
    Wu, Tzong-Chen
    Yeh, Ming-Kuei
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (02) : 249 - 265
  • [5] An Efficient Provably Secure Password-Based Authenticated Key Agreement
    Xu, Hanqiu
    Wang, Qingping
    Zhou, Jing
    Ruan, Ou
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 423 - 434
  • [6] Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks
    Kwon, Jeong Ok
    Sakurai, Kouichi
    Lee, Dong Hoon
    [J]. COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 977 - 980
  • [7] Provably secure three-party password-based authenticated key exchange protocol
    Zhao, Jianjie
    Gu, Dawu
    [J]. INFORMATION SCIENCES, 2012, 184 (01) : 310 - 323
  • [9] Efficient provably secure password-based explicit authenticated key agreement
    Ruan, Ou
    Kumar, Neeraj
    He, Debiao
    Lee, Jong-Hyouk
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 50 - 60
  • [10] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72