Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes

被引:2
|
作者
Bootle, Jonathan [1 ]
Faller, Sebastian [1 ,2 ]
Hesse, Julia [1 ]
Hostakova, Kristina [2 ]
Ottenhues, Johannes [3 ]
机构
[1] IBM Res Europe Zurich, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Univ St Gallen, St Gallen, Switzerland
来源
ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT VIII | 2023年 / 14445卷
基金
瑞士国家科学基金会;
关键词
Attacks on Public-Key Constructions; Key Exchange Protocols; Password-Based Cryptography; UC Framework; SECURE COMPUTATION;
D O I
10.1007/978-981-99-8742-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic keys to be generated from authentication data that is both fuzzy and of low entropy. The strong protection against offline attacks offered by fuzzy PAKE opens an interesting avenue towards secure biometric authentication, typo-tolerant password authentication, and automated IoT device pairing. Previous constructions of fuzzy PAKE are either based on Error Correcting Codes (ECC) or generic multi-party computation techniques such as Garbled Circuits. While ECC-based constructions are significantly more efficient, they rely on multiple special properties of error correcting codes such as maximum distance separability and smoothness. We contribute to the line of research on fuzzy PAKE in two ways. First, we identify a subtle but devastating gap in the security analysis of the currently most efficient fuzzy PAKE construction (Dupont et al., Eurocrypt 2018), allowing a man-in-the-middle attacker to test individual password characters. Second, we provide a new fuzzy PAKE scheme based on ECC and PAKE that provides a built-in protection against individual password character guesses and requires fewer, more standard properties of the underlying ECC. Additionally, our construction offers better error correction capabilities than previous ECC-based fuzzy PAKEs.
引用
收藏
页码:110 / 142
页数:33
相关论文
共 50 条
  • [11] Threshold password-authenticated key exchange (extended abstract)
    MacKenzie, P
    Shrimpton, T
    Jakobsson, M
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 385 - 400
  • [12] Password-authenticated key exchange using efficient MACs
    Strangio, Maurizio A.
    JOURNAL OF COMPUTERS, 2006, 1 (08) : 27 - 35
  • [13] Cryptanalysis of two password-authenticated key exchange protocols
    Wan, ZG
    Wang, SH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 164 - 175
  • [14] Efficient password-authenticated key exchange based on RSA
    Park, Sangjoon
    Nam, Junghyun
    Kim, Seungjoo
    Won, Dongho
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 309 - +
  • [15] ttPAKE: Typo tolerance password-authenticated key exchange
    Han, Yunxia
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    Chen, Kefei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [16] Analysis of the SPEKE password-authenticated key exchange protocol
    Zhang, MX
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (01) : 63 - 65
  • [17] IDMS quantum password-authenticated key exchange protocols
    Zhang, Lu
    Sun, Yan
    Xu, Yingfei
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 25 (3-4)
  • [18] Owl: An Augmented Password-Authenticated Key Exchange Scheme
    Hao, Feng
    Bag, Samiran
    Chen, Liqun
    van Oorschot, Paul C.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 227 - 244
  • [19] Provably secure threshold password-authenticated key exchange
    Di Raimondo, Mario
    Gennaro, Rosario
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 978 - 1001
  • [20] Research on password-authenticated key exchange protocol over lattices
    Guo Y.
    Yin A.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187