UC-secure Two-Server Password-Based Authentication Protocol and Its Applications

被引:5
|
作者
Zhang, Lin [1 ]
Zhang, Zhenfeng [1 ]
Hu, Xuexian [2 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
来源
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Universal composability; two-server password-based authentication; key exchange; secret sharing;
D O I
10.1145/2897845.2897872
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-server password-based authentication (2PA) protocol is a special kind of authentication primitive that provides additional protection for the user's password. Through a 2PA protocol, a user can distribute his low-entropy password between two authentication servers in the initialization phase and authenticate himself merely via a matching password in the login phase. No single server can learn any information about the user's password, nor impersonate the legitimate user to authenticate to the honest server. In this paper, we first formulate and realize the security definition of two-server password-based authentication in the well-known universal composability (UC) framework, which thus provides desirable properties such as composable security. We show that our construction is suitable for the asymmetric communication model in which one server acts as the front-end server interacting directly with the user and the other stays backstage. Then, we show that our protocol could be easily extended to more complicate password-based cryptographic protocols such as two-server password-authenticated key exchange (2PAKE) and two-server password-authenticated secret sharing (2PASS), which enjoy stronger security guarantees and better efficiency performances in comparison with the existing schemes
引用
收藏
页码:153 / 164
页数:12
相关论文
共 13 条
  • [1] Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
    Camenisch, Jan
    Enderlein, Robert R.
    Neven, Gregory
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 283 - 307
  • [2] A practical password-based two-server authentication and key exchange system
    Yang, YJ
    Deng, RH
    Bao, F
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) : 105 - 114
  • [3] Proofs for two-server password authentication
    Szydlo, M
    Kaliski, B
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 227 - 244
  • [4] A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 325 - 329
  • [5] Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
    Blazy, Olivier
    Chevalier, Celine
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 3 - 18
  • [6] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [7] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [8] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [9] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861
  • [10] DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services
    Zhang, Songsong
    Yong, Xie
    Luo, Min
    He, Debiao
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2172 - 2182