Post-quantum verifier-based three-party password authenticated key exchange protocol

被引:0
作者
Lian H. [1 ]
Hou H. [1 ]
Zhao Y. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Fudan University, Shanghai
[2] State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an
来源
Tongxin Xuebao/Journal on Communications | 2022年 / 43卷 / 04期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Lattice; Password authentication; Provable security; Three-party key exchange; Verifier;
D O I
10.11959/j.issn.1000-436x.2022062
中图分类号
学科分类号
摘要
In view of the fact that server stored the passwords directly in plaintext, there was a risk of server compromise, and two-party PAKE protocol was not suitable for large-scale communication systems, a three-party verifier-based password authenticated key exchange protocol from lattices was proposed. Hashing scheme and zero-knowledge password policy check were combined to realize the generation of verifier and the password checking. A novel verifier-based 3PAKE protocol was constructed by using CCA-secure public-key encryption from lattices, which realized mutual authentication. Security and performance analysis shows that the proposed protocol has better advantages in communication efficiency and security. © 2022, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:95 / 106
页数:11
相关论文
共 29 条
[1]  
BELLOVIN S M, MERRITT M., Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72-84, (1992)
[2]  
VASCO M I G, POZO A L P D, SORIENTE C., A key for John Doe: modeling and designing anonymous password-authenticated key exchange protocols, IEEE Transactions on Dependable and Secure Computing, 18, 3, pp. 1336-1353, (2021)
[3]  
BRADLEY T, JARECKI S, XU J., Strong asymmetric PAKE based on trapdoor CKEM, 2019 Advances in Cryptology, pp. 798-825, (2019)
[4]  
ABDALLA M, BARBOSA M, BRADLEY T, Et al., Universally composable relaxed password authenticated key exchange, 2020 Advances in Cryptology, pp. 278-307, (2020)
[5]  
KATZ J, VAIKUNTANATHAN V., Round-optimal password-based authenticated key exchange, Journal of Cryptology, 26, 4, pp. 714-743, (2013)
[6]  
KATZ J, VAIKUNTANATHAN V., Smooth projective hashing and password-based authenticated key exchange from lattices, 2009 Advances in Cryptology, pp. 636-652, (2009)
[7]  
GENNARO R, LINDELL Y., A framework for password-based authenticated key exchange1, ACM Transactions on Information and System Security (TISSEC), 9, 2, pp. 181-234, (2006)
[8]  
DING Y, FAN L., Efficient password-based authenticated key exchange from lattices, 2012 Seventh International Conference on Computational Intelligence and Security, pp. 934-938, (2012)
[9]  
GROCE A, KATZ J., A new framework for efficient password-based authenticated key exchange, Proceedings of the 17th ACM conference on Computer and communications security, pp. 516-525, (2010)
[10]  
DING J, ALSAYIGH S, LANCRENON J, Et al., Provably secure password authenticated key exchange based on RLWE for the post-quantum world, 2017 Cryptographers' Track at the RSA Conference, pp. 183-204, (2017)