Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes

被引:2
|
作者
Bootle, Jonathan [1 ]
Faller, Sebastian [1 ,2 ]
Hesse, Julia [1 ]
Hostakova, Kristina [2 ]
Ottenhues, Johannes [3 ]
机构
[1] IBM Res Europe Zurich, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Zurich, Switzerland
[3] Univ St Gallen, St Gallen, Switzerland
来源
ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT VIII | 2023年 / 14445卷
基金
瑞士国家科学基金会;
关键词
Attacks on Public-Key Constructions; Key Exchange Protocols; Password-Based Cryptography; UC Framework; SECURE COMPUTATION;
D O I
10.1007/978-981-99-8742-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE) allows cryptographic keys to be generated from authentication data that is both fuzzy and of low entropy. The strong protection against offline attacks offered by fuzzy PAKE opens an interesting avenue towards secure biometric authentication, typo-tolerant password authentication, and automated IoT device pairing. Previous constructions of fuzzy PAKE are either based on Error Correcting Codes (ECC) or generic multi-party computation techniques such as Garbled Circuits. While ECC-based constructions are significantly more efficient, they rely on multiple special properties of error correcting codes such as maximum distance separability and smoothness. We contribute to the line of research on fuzzy PAKE in two ways. First, we identify a subtle but devastating gap in the security analysis of the currently most efficient fuzzy PAKE construction (Dupont et al., Eurocrypt 2018), allowing a man-in-the-middle attacker to test individual password characters. Second, we provide a new fuzzy PAKE scheme based on ECC and PAKE that provides a built-in protection against individual password character guesses and requires fewer, more standard properties of the underlying ECC. Additionally, our construction offers better error correction capabilities than previous ECC-based fuzzy PAKEs.
引用
收藏
页码:110 / 142
页数:33
相关论文
共 50 条
  • [21] Practical Password-Authenticated Three-Party Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (06): : 312 - 332
  • [22] A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
    Lo, Jung-Wen
    Lin, Shu-Chen
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (02): : 146 - 151
  • [23] Cryptanalysis of some improved password-authenticated key exchange schemes
    Phan, Raphael C. -W.
    Goi, Bok-Min
    Wong, Kah-Hoong
    COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2822 - 2829
  • [24] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [25] The "Quantum Annoying" Property of Password-Authenticated Key Exchange Protocols
    Eaton, Edward
    Stebila, Douglas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 154 - 173
  • [26] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [27] Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange
    Hanai, Shuya
    Tanaka, Keisuke
    Tezuka, Masayuki
    Yoshida, Yusuke
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT II, SCN 2024, 2024, 14974 : 272 - 293
  • [28] A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (11) : 3312 - 3324
  • [29] Password-authenticated key exchange between clients with different passwords
    Byun, JW
    Jeong, IR
    Lee, DH
    Park, CS
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 134 - 146
  • [30] A general compiler for password-authenticated group key exchange protocol
    Li, Hui
    Wu, Chuan-Kun
    Sun, Jun
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 160 - 167