Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange

被引:0
|
作者
Hanai, Shuya [1 ]
Tanaka, Keisuke [1 ]
Tezuka, Masayuki [1 ]
Yoshida, Yusuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT II, SCN 2024 | 2024年 / 14974卷
关键词
Asymmetric Password-Authenticated Key Exchange; Universal Composability;
D O I
10.1007/978-3-031-71073-5_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password-Authenticated Key Exchange (PAKE) establishes a secure channel between two parties who share a password. Asymmetric PAKE is a variant of PAKE, where one party stores a hash of the password to preserve security under the situation that the party is compromised. The security of PAKE and asymmetric PAKE is often analyzed in the framework of universal composability (UC). Abdalla et al. (CRYPTO '20) relaxed the UC security of PAKE and showed that the relaxed security still guarantees reasonable properties. This relaxation makes it possible to prove the security in the UC framework for several PAKE protocols. In this paper, we propose a relaxed functionality of asymmetric PAKE by following the approach of Abdalla et al. We prove that the SPAKE2+ protocol UC-realizes this functionality. We also define a more relaxed functionality and prove that a variant of the AuCPace protocol UC-realizes it.
引用
收藏
页码:272 / 293
页数:22
相关论文
共 50 条
  • [31] Research on password-authenticated key exchange protocol over lattices
    Guo Y.
    Yin A.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187
  • [32] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [33] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151
  • [34] Cryptanalysis of some improved password-authenticated key exchange schemes
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Wong, Kah-Hoong
    COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2822 - 2829
  • [35] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [36] The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols
    Eaton, Edward
    Stebila, Douglas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 154 - 173
  • [37] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [38] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [39] Password-authenticated key exchange between clients with different passwords
    Byun, JW
    Jeong, IR
    Lee, DH
    Park, CS
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 134 - 146
  • [40] Universally Composable Two-Party Password-Based Authenticated Key Exchange from Ideal Lattices
    Shu Qin
    Wang Shengbao
    Lu Fanyi
    Han Lidong
    Tan Xiao
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (06) : 1756 - 1763