Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions

被引:9
|
作者
Shin, SeongHan [1 ,2 ]
Kobara, Kazukuni [1 ,2 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Tokyo 1010021, Japan
[2] Chuo Univ, Tokyo 1128551, Japan
关键词
authenticated key exchange; passwords; on-line/off-line dictionary attacks; password-authenticated key exchange; anonymity; efficiency; provable security; PROTOCOLS; SECURE;
D O I
10.1587/transfun.E93.A.102
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous password-authenticated key exchange (anonymous PAKE) protocol is designed to provide both password-only authentication and user anonymity against a semi-honest server, who follows the protocol honestly. Very recently, Yang and Zhang [25] have proposed a new anonymous PAKE (NAPAKE) protocol that is claimed efficient compared to the previous constructions. In this paper, we propose a very-efficient anonymous PAKE (called, VEAP) protocol that provides the most efficiency among their kinds in terms of computation and communication costs. The VEAP protocol guarantees semantic security of session keys in the random oracle model under the chosen target CDH problem., and unconditional user anonymity against a semi-honest server. If the pre-computation is allowed, both the user and the server are required to compute only one modular exponentiation, respectively. Surprisingly, this is the same computation cost of the well-known Diffie-Hellman protocol that does not provide authentication at all. In addition, we extend the VEAP protocol in two ways: the first is designed to reduce the communication costs of the VEAP protocol and the second shows that stripping off anonymity parts from the VEAP protocol results in a new, PAKE protocol.
引用
收藏
页码:102 / 115
页数:14
相关论文
共 50 条
  • [1] Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS, AND ERROR-CORRECTING CODES, 2009, 5527 : 149 - 158
  • [2] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [3] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [4] A new verifier-based anonymous password-authenticated key exchange protocol
    [J]. Wu, Tsu-Yang (wutsuyang@gmail.com), 2018, Ubiquitous International (09):
  • [5] Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
    Abdalla, Michel
    Izabachene, Malika
    Pointcheval, David
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 133 - 148
  • [6] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    [J]. Journal of Cryptology, 2006, 19 : 27 - 66
  • [7] Fuzzy Password-Authenticated Key Exchange
    Dupont, Pierre-Alain
    Hesse, Julia
    Pointcheval, David
    Reyzin, Leonid
    Yakoubov, Sophia
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 393 - 424
  • [8] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    [J]. JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [9] A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Soriente, Claudio
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1336 - 1353
  • [10] Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2095 - 2110