[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11767480_10guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Password based server aided key exchange

Published: 06 June 2006 Publication History

Abstract

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

References

[1]
M. Abdalla, P.-A. Fouque, and D. Pointcheval. Password-based authenticated key exchange in the three-party setting. In Public Key Cryptography-- PKC 2005, volume 3386 of LNCS, pages 65-84. Springer, 2005.
[2]
M. Abdalla and D. Pointcheval. Interactive Diffie-Hellman assumptions with applications to password-based authentication. In Financial Cryptography and Data Security--FC 2005, volume 3570 of LNCS, pages 341-356. Springer, 2005. Full version: http://www.di.ens.fr/$\sim$pointche/pub.php?reference=AbPo05.
[3]
M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 419-428. ACM Press, 1998. Full version: http:// www-cse.ucsd.edu/users/mihir/papers/key-distribution.html.
[4]
D. Boneh. The decision Diffie-Hellman problem. In Proceedings of the Third Algorithmic Number Theory Symposium, volume 1423 of LNCS, pages 48-
[5]
Springer, 1998.
[6]
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - Eurocrypt 2000, volume 1807 of LNCS, pages 139-155. Springer, 2000.
[7]
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - CRYPTO'93, volume 773 of LNCS, pages 232- 249. Springer, 1993. Full version: www-cse.ucsd.edu/users/mihir.
[8]
M. Bellare and P. Rogaway. Provably secure session key distribution - the three party case. In Proceedings of the 27th ACM Symposium on the Theory of Computing, pages 57-66. ACM Press, 1995.
[9]
K.-K. R. Choo, C. Boyd, and Y. Hitchcock. Errors in computational complexity proofs for protocols. In Advances in Cryptology--Asiacrypt 2005, volume 3788 of LNCS, pages 624-643. Springer, 2005.
[10]
K.-K. R. Choo, C. Boyd, and Y. Hitchcock. Examining indistinguishabilitybased proof models for key establishment protocols. In Advances in Cryptology--Asiacrypt 2005, volume 3788 of LNCS, pages 585-604. Springer, 2005.
[11]
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 453-474. Springer, 2001. http://eprint.iacr.org/2001/040.ps.gz.
[12]
Y. Dodis, R. Gennaro, J. Håstad, Krawczyk H., and T. Rabin. Randomness extraction and key derivation using the CBC, cascade and HMAC modes. In Advances in Cryptology -- CRYPTO 2004 Proceedings, volume 3152 of LNCS, pages 494-510. Springer, 2004.
[13]
R. Gennaro, Krawczyk H., and T. Rabin. Secure hashed Diffie-Hellman over non-DDH groups. In Advances in Cryptology -- EUROCRYPT 2004 Proceedings, volume 3027 of LNCS, pages 361-381. Springer, 2004. Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/2004/099), Report 2004/099.
[14]
Y. Hitchcock, C. Boyd, and J. M. González Nieto. Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Applicable Algebra in Engineering, Communication and Computing (AAECC) Journal, 2005. Special issue on Mathematical Techniques in Cryptology; http://dx.doi.org/10.1007/s00200-005-0185-9.
[15]
S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. ACM Trans. on Information and Systems Security, 2(3):230-268, 1999.
[16]
Y. Hitchcock, Y. S. T. Tin, C. Boyd, J. M. González Nieto, and P. Montague. A password-based authenticator: Security proof and applications. In 4th International Conference on Cryptology in India - INDOCRYPT 2003, volume 2904 of LNCS. Springer, 2003.
[17]
IEEE (Institute of Electrical and Electronics Engineers, Inc.). P1363.2: Standard specifications for password-based public-key cryptographic techniques (draft version d23), 2006. http://grouper.ieee.org/ groups/1363/passwdPK/draft.html.
[18]
J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Advances in Cryptology-- EUROCRYPT 2001, volume 2045 of LNCS, pages 475-494. Springer, 2001.
[19]
P. MacKenzie. The PAK suite: Protocols for passwordauthenticated key exchange. Technical Report 2002-46, DIMACS, 2002. ftp://dimacs.rutgers.edu/pub/dimacs/TechnicalReports/ TechReports/2002/2002-46.ps.gz.

Cited By

View all
  • (2017)End-to-End PasswordsProceedings of the 2017 New Security Paradigms Workshop10.1145/3171533.3171542(107-121)Online publication date: 1-Oct-2017
  • (2008)Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology10.1007/978-3-540-89754-5_14(172-184)Online publication date: 14-Dec-2008
  • (2006)Cryptanalysis of two provably secure cross-realm C2C-PAKE protocolsProceedings of the 7th international conference on Cryptology in India10.1007/11941378_9(104-117)Online publication date: 11-Dec-2006

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACNS'06: Proceedings of the 4th international conference on Applied Cryptography and Network Security
June 2006
485 pages
ISBN:3540347038
  • Editors:
  • Jianying Zhou,
  • Moti Yung,
  • Feng Bao

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 06 June 2006

Author Tags

  1. key agreement
  2. password authentication
  3. three-party

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)End-to-End PasswordsProceedings of the 2017 New Security Paradigms Workshop10.1145/3171533.3171542(107-121)Online publication date: 1-Oct-2017
  • (2008)Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology10.1007/978-3-540-89754-5_14(172-184)Online publication date: 14-Dec-2008
  • (2006)Cryptanalysis of two provably secure cross-realm C2C-PAKE protocolsProceedings of the 7th international conference on Cryptology in India10.1007/11941378_9(104-117)Online publication date: 11-Dec-2006

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media