A secure threshold anonymous password-authenticated key exchange protocol

被引:0
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, RCIS, Chiyoda Ku, 1-18-13 Sotokannda, Tokyo 1010021, Japan
[2] Chuo Univ, Bunkyo Ku, Tokyo 1128551, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At Indocrypt 2005, Viet et al., [20] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client's password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-line dictionary attacks. For the threshold t > 1, we propose a secure threshold anonymous PAKE (for short, TAP) protocol with the number of clients n upper-bounded, such that n <= 2 root N-1-1, where N is a dictionary size of passwords. We also show that the TAP protocol provides semantic security of session keys in the random oracle model, with the reduction to the computational Diffie-Hellman problem, as well as anonymity against a passive server. For the threshold t = 1, we propose an efficient anonymous PAKE protocol that significantly improves efficiency in terms of computation costs and communication bandwidth compared to the original (not threshold) anonymous PAKE protocol [20].
引用
收藏
页码:444 / +
页数:3
相关论文
共 50 条
  • [1] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [2] Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2095 - 2110
  • [3] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [4] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    [J]. Journal of Cryptology, 2006, 19 : 27 - 66
  • [5] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    [J]. JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [6] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523
  • [7] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677
  • [8] A Secure Two-Party Password-Authenticated Key Exchange Protocol
    Saeed, Maryam
    Shahhoseini, Hadi Shahriar
    Mackvandi, Ali
    Rezaeinezhad, Mohammad Reza
    Naddafiun, Mansour
    Bidoki, Mohammad Zare
    [J]. 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 466 - 474
  • [9] A new verifier-based anonymous password-authenticated key exchange protocol
    [J]. Wu, Tsu-Yang (wutsuyang@gmail.com), 2018, Ubiquitous International (09):
  • [10] An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks
    Li, Wenmin
    Wen, Qiaoyan
    Su, Qi
    Jin, Zhengping
    Wang, Yanjiong
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2012, 16 (1-3) : 29 - 44