Universally Composable Gateway-Oriented Password-Authenticated Key Exchange Protocol

被引:0
作者
Hu X.-X. [1 ,2 ,3 ]
Zhang Q.-H. [1 ]
Zhang Z.-F. [2 ]
Liu F.-M. [3 ]
机构
[1] The PLA Information Engineering University, Zhengzhou
[2] Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing
[3] Science and Technology on Information Assurance Laboratory, Beijing
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2017年 / 40卷 / 05期
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Gateway-oriented protocol; Key exchange; Password authentication; Provable security; Universal composability framework;
D O I
10.11897/SP.J.1016.2017.01109
中图分类号
学科分类号
摘要
Gateway-oriented password-authenticated key exchange(GPAKE) protocol is an important cryptographic primitive executed among a client, a gateway and an authentication server, where a password is only shared between the client and the server, but a session key which has high-entropy is exchanged between the client and the gateway. Because of their convenience in practice, GPAKE protocols have attracted much attention in recent years. However, almost all existing GPAKE protocols are analyzed only in `stand-alone' security models, in which some basic security goals, such as protocol composability and security when related passwords are used by one user within different protocols, are not considered. To overcome these deficiencies, we consider the security definition of GPAKE in the well-known Universal Composability (UC) framework. We first formulate an ideal functionality within the UC framework for GPAKE protocols, which captures the requirements of semantic security of session keys, resistance to password-guessing attacks mounted by malicious gateway, key privacy with respect to the honest-but-curious server, as well as protocol composable security. Moreover, since in the formulation of the GPAKE functionality we let the environment choose passwords for all parties, our definition captures the cases that related passwords are used by different parties, or by the same parties for different protocols, even when the passwords are selected from arbitrary probability distribution. In addition, by utilizing cryptographic primitives such as UC secure 2-party protocols and message authentication codes, we put forward a general construction of GPAKE protocol, which can be instantiated to several concrete protocols. We then prove the security of our construction rigorously in the UC framework, i.e., the construction can securely realize the GPAKE functionality. © 2017, Science Press. All right reserved.
引用
收藏
页码:1109 / 1120
页数:11
相关论文
共 36 条
[1]  
Bellare M., Pointcheval D., Rogaway P., Authenticated key exchange secure against dictionary attack, Proceedings of the EUROCRYPT 2000, pp. 139-155, (2000)
[2]  
Katz J., Ostrovsky R., Yung M., Practical password-authenticated key exchange provably secure under standard assumptions, Proceedings of the EUROCRYPT 2001, pp. 475-494, (2001)
[3]  
Abdalla M., Fouque P., Pointcheval D., Password-based authenticated key exchange in the three-party setting, Proceedings of the PKC 2005, pp. 65-84, (2005)
[4]  
Canetti R., Halevi S., Katz J., Et al., Universally composable password-based key exchange, Proceedings of the EUROCRYPT 2005, pp. 404-421, (2005)
[5]  
Benhamouda F., Blazy O., Chevalier C., Et al., New techniques for SPHFs and efficient One-Round PAKE Protocols, Proceedings of the CRYPTO 2013, pp. 449-475, (2013)
[6]  
Abdalla M., Benhamouda F., Mackenzie P., Security of the J-PAKE password- authenticated key exchange protocol, Proceedings of the 2015 IEEE Symposium on Security and Privacy(S&P), pp. 571-587, (2015)
[7]  
Xu J., Hu X.X., Zhang Z.F., Round-optimal password-based group key exchange protocols in the standard model, Proceedings of the Applied Cryptography and Network Security, pp. 42-61, (2015)
[8]  
Abdalla M., Chevassut O., Fouque P.A., Et al., A simple threshold authenticated key exchange from short secrets, Proceedings of the ASIACRYPT 2005, pp. 566-584, (2005)
[9]  
Byun J.W., Lee D.H., Lim J.I., Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol, IEEE Communications Letters, 10, 9, pp. 683-685, (2006)
[10]  
Shim K.A., Cryptanalysis and enhancement of modified gateway-oriented password-based authenticated key exchange protocol, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 91, 12, pp. 3837-3839, (2008)