PASTA: PASsword-based Threshold Authentication

被引:53
作者
Agrawal, Shashank [1 ]
Miao, Peihan [1 ,2 ]
Mohassel, Payman [1 ]
Mukherjee, Pratyay [1 ]
机构
[1] Visa Res, Palo Alto, CA 94306 USA
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
关键词
passwords; token-based authentication; threshold cryptography; digital signature; message authentication code; oblivious pseudorandom function; KEY EXCHANGE; SECURE; SIGNATURES; EFFICIENT; RSA;
D O I
10.1145/3243734.3243839
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and on enterprise networks using a wide range of open standards and network authentication protocols: clients sign on to an identity provider using their username/password to obtain a cryptographic token generated with a master secret key, and store the token for future accesses to various services and applications. The authentication server(s) are single point of failures that if breached, enable attackers to forge arbitrary tokens or mount offline dictionary attacks to recover client credentials. Our work is the first to introduce and formalize the notion of password-based threshold token-based authentication which distributes the role of an identity provider among n servers. Any t servers can collectively verify passwords and generate tokens, while no t - 1 servers can forge a valid token or mount offline dictionary attacks. We then introduce PASTA, a general framework that can be instantiated using any threshold token generation scheme, wherein clients can "sign-on" using a two-round (optimal) protocol that meets our strong notions of unforgeability and password-safety. We instantiate and implement our framework in C++ using two threshold message authentication codes (MAC) and two threshold digital signatures with different trade-offs. Our experiments show that the overhead of protecting secrets and credentials against breaches in PASTA, i.e. compared to a naive single server solution, is extremely low (1-5%) in the most likely setting where client and servers communicate over the internet. The overhead is higher in case of MAC-based tokens over a LAN (though still only a few milliseconds) due to public-key operations in PASTA. We show, however, that this cost is inherent by proving a symmetric-key only solution impossible.
引用
收藏
页码:2042 / 2059
页数:18
相关论文
共 56 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3788, P566
[3]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P441
[4]   Robust Password-Protected Secret Sharing [J].
Abdalla, Michel ;
Cornejo, Mario ;
Nitulescu, Anca ;
Pointcheval, David .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :61-79
[5]   Scrypt Is Maximally Memory-Hard [J].
Alwen, Joel ;
Chen, Binyi ;
Pietrzak, Krzysztof ;
Reyzin, Leonid ;
Tessaro, Stefano .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 :33-62
[6]   On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model [J].
Alwen, Joel ;
Chen, Binyi ;
Kamath, Chethan ;
Kolmogorov, Vladimir ;
Pietrzak, Krzysztof ;
Tessaro, Stefano .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :358-387
[7]  
[Anonymous], 2002, 198 NFIPS, P29
[8]  
[Anonymous], P 16 INF SEC C ISC 2
[9]  
Aranha D.F., RELIC is an Efficient LIbrary for Cryptography
[10]  
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433