Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks

被引:3
|
作者
Shin, SeongHan [1 ,2 ]
Kobara, Kazukuni [1 ,2 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur RCIS, Tsukuba, Ibaraki 3058568, Japan
[2] Chuo Univ, Tokyo 1128551, Japan
关键词
password-authenticated key exchange; passwords; on-line/off-line dictionary attacks; anonymity; insider attacks; provable security; SIGNATURE SCHEME; PROTOCOLS;
D O I
10.1587/transinf.E94.D.2095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous password-authenticated key exchange (PAKE) protocol is designed to provide both password-only authentication and client anonymity against a semi-honest server, who honestly follows the protocol. In INDOCRYPT2008, Yang and Zhang [26] proposed a new anonymous PAKE (NAPAKE) protocol and its threshold (D-NAPAKE) which they claimed to be secure against insider attacks. In this paper, we first show that the D-NAPAKE protocol [26] is completely insecure against insider attacks unlike their claim. Specifically, only one legitimate client can freely impersonate any subgroup of clients (the threshold t > 1) to the server. After giving a security model that captures insider attacks, we propose a threshold anonymous PAKE (called, TAP(+)) protocol which provides security against insider attacks. Moreover, we prove that the TAP(+) protocol has semantic security of session keys against active attacks as well as insider attacks under the computational Diffie-Hellman problem, and provides client anonymity against a semi-honest server, who honestly follows the protocol. Finally, several discussions are followed: I) We also show another threshold anonymous PAKE protocol by applying our RATIONALE to the non-threshold anonymous PAKE (VEAP) protocol [23]; and 2) We give the efficiency comparison, security consideration and implementation issue of the TAP(+) protocol.
引用
收藏
页码:2095 / 2110
页数:16
相关论文
共 50 条
  • [41] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122
  • [42] Password-Authenticated Key Exchange from Group Actions
    Abdalla, Michel
    Eisenhofer, Thorsten
    Kiltz, Eike
    Kunzweiler, Sabrina
    Riepel, Doreen
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 699 - 728
  • [43] Authenticated key exchange secure against dictionary attacks
    Bellare, M
    Pointcheval, D
    Rogaway, P
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 139 - 155
  • [44] A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
    He, Daojing
    Chen, Chun
    Ma, Maode
    Chan, Sammy
    Bu, Jiajun
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (04) : 495 - 504
  • [45] Research on password-authenticated key exchange protocol over lattices
    Guo, Yuanbo
    Yin, Anqi
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187
  • [46] Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption
    Wang, Fengjiao
    Zhang, Yuqing
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 124 - 133
  • [47] Universally composable anonymous password authenticated key exchange
    Xuexian HU
    Jiang ZHANG
    Zhenfeng ZHANG
    Jing XU
    [J]. Science China(Information Sciences), 2017, 60 (05) : 153 - 168
  • [48] Universally composable anonymous password authenticated key exchange
    Hu, Xuexian
    Zhang, Jiang
    Zhang, Zhenfeng
    Xu, Jing
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [49] Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange
    Chuang, Po-Jen
    Liao, Yi-Ping
    [J]. 2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 701 - 708
  • [50] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332