Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks

被引:3
|
作者
Shin, SeongHan [1 ,2 ]
Kobara, Kazukuni [1 ,2 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur RCIS, Tsukuba, Ibaraki 3058568, Japan
[2] Chuo Univ, Tokyo 1128551, Japan
关键词
password-authenticated key exchange; passwords; on-line/off-line dictionary attacks; anonymity; insider attacks; provable security; SIGNATURE SCHEME; PROTOCOLS;
D O I
10.1587/transinf.E94.D.2095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous password-authenticated key exchange (PAKE) protocol is designed to provide both password-only authentication and client anonymity against a semi-honest server, who honestly follows the protocol. In INDOCRYPT2008, Yang and Zhang [26] proposed a new anonymous PAKE (NAPAKE) protocol and its threshold (D-NAPAKE) which they claimed to be secure against insider attacks. In this paper, we first show that the D-NAPAKE protocol [26] is completely insecure against insider attacks unlike their claim. Specifically, only one legitimate client can freely impersonate any subgroup of clients (the threshold t > 1) to the server. After giving a security model that captures insider attacks, we propose a threshold anonymous PAKE (called, TAP(+)) protocol which provides security against insider attacks. Moreover, we prove that the TAP(+) protocol has semantic security of session keys against active attacks as well as insider attacks under the computational Diffie-Hellman problem, and provides client anonymity against a semi-honest server, who honestly follows the protocol. Finally, several discussions are followed: I) We also show another threshold anonymous PAKE protocol by applying our RATIONALE to the non-threshold anonymous PAKE (VEAP) protocol [23]; and 2) We give the efficiency comparison, security consideration and implementation issue of the TAP(+) protocol.
引用
收藏
页码:2095 / 2110
页数:16
相关论文
共 50 条
  • [1] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [2] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [3] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [4] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    [J]. JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [5] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    [J]. Journal of Cryptology, 2006, 19 : 27 - 66
  • [6] Provably secure threshold password-authenticated key exchange extended abstract
    Di Raimondo, M
    Gennaro, R
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 507 - 523
  • [7] Threshold password-authenticated key exchange (extended abstract)
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 385 - 400
  • [8] Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 102 - 115
  • [9] Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
    Abdalla, Michel
    Izabachene, Malika
    Pointcheval, David
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 133 - 148
  • [10] A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
    Yang, Xiaoyan
    Jiang, Han
    Xu, Qiuliang
    Hou, Mengbo
    Wei, Xiaochao
    Zhao, Minghao
    Choo, Kim-Kwang Raymond
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 670 - 677