Provably secure threshold password-authenticated key exchange extended abstract

被引:0
|
作者
Di Raimondo, M [1 ]
Gennaro, R
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95124 Catania, Italy
[2] IBM Corp, TJ Watson Res Ctr, Yorktown Hts, NY USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present two protocols for threshold password authenticated key exchange. In this model, the password is not stored in a single authenticating server but rather shared among a set of n servers so that an adversary can learn the password only by breaking into t + 1 of them. The protocols require n > 3t servers to work. The protocols require n > 3t servers to work. The goal is to protect the password against hackers attacks that can break into the authenticating server and steal password information. All known centralized password authentication schemes are susceptible to such an attack. Ours are the first protocols which are provably secure in the standard model (i.e. no random oracles are used for the proof of security). Moreover our protocols are reasonably efficient and implementable in practice. In particular a goal of the design was to avoid costly zero-knowledge proofs to keep interaction to a minimum.
引用
收藏
页码:507 / 523
页数:17
相关论文
共 50 条
  • [1] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [2] Threshold password-authenticated key exchange (extended abstract)
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 385 - 400
  • [3] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [4] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [5] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [6] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    [J]. Journal of Cryptology, 2006, 19 : 27 - 66
  • [7] Threshold password-authenticated key exchange
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    [J]. JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 27 - 66
  • [8] Provably Secure Quantum Resistance Efficient Password-Authenticated Key Exchange Protocol
    Yin, An-Qi
    Wang, Ding
    Guo, Yuan-Bo
    Chen, Lin
    Tang, Di
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2321 - 2336
  • [9] Provably secure password-authenticated key exchange using Diffie-Hellman
    Boyko, V
    MacKenzie, P
    Patel, S
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 156 - 171
  • [10] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122