Adaptive Witness Encryption and Asymmetric Password-Based Cryptography

被引:14
|
作者
Bellare, Mihir [1 ]
Viet Tung Hoang [2 ,3 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, San Diego, CA 92103 USA
[2] Georgetown Univ, Dept Comp Sci, Washington, DC USA
[3] Univ Maryland, Dept Comp Sci, Washington, DC USA
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015 | 2015年 / 9020卷
关键词
SECURITY;
D O I
10.1007/978-3-662-46447-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the security of their own applications. We introduce adaptively-sound (AS) witness encryption to fill the gap. We then introduce asymmetric password-based encryption (APBE). This offers gains over classical, symmetric password-based encryption in the face of attacks that compromise servers to recover hashed passwords. We distinguish between invasive A-PBE schemes (they introduce new password-based key-derivation functions) and non-invasive ones (they can use existing, deployed password-based key-derivation functions). We give simple and efficient invasive A-PBE schemes and use AS-secure witness encryption to give non-invasive A-PBE schemes.
引用
收藏
页码:308 / 331
页数:24
相关论文
共 50 条
  • [1] Password-based encryption analyzed
    Abadi, M
    Warinschi, B
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 664 - 676
  • [2] Large Key Sizes and the Security of Password-Based Cryptography
    Boklan, Kent D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (01) : 65 - 72
  • [3] On Security of Key Derivation Functions in Password-based Cryptography
    Kodwani, Gaurav
    Arora, Shashank
    Atrey, Pradeep K.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 109 - 114
  • [4] Password-based encryption approach for securing sensitive data
    Mustacoglu, Ahmet F.
    Catak, Ferhat O.
    Fox, Geoffrey C.
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [5] Per-Session Security: Password-Based Cryptography Revisited
    Demay, Gregory
    Gazi, Peter
    Maurer, Ueli
    Tackmann, Bjorn
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 408 - 426
  • [6] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Erguler, Imran
    Anarim, Emin
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 543 - 548
  • [7] Persistent asymmetric password-based key exchange
    Jiang, Shaoquan
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2014, 8 (01) : 31 - 70
  • [8] Per-session security: Password-based cryptography revisited
    Demay, Gregory
    Gazi, Peter
    Maurer, Ueli
    Tackmann, Bjoern
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (01) : 75 - 111
  • [9] A Password-based Key Establishment Protocol with Symmetric Key Cryptography
    Ergueler, Imran
    Anarim, Emin
    2008 IEEE 16TH SIGNAL PROCESSING, COMMUNICATION AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2008, : 395 - 399
  • [10] Multi-instance Security and Its Application to Password-Based Cryptography
    Bellare, Mihir
    Ristenpart, Thomas
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 312 - 329