Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

被引:26
作者
Schneider, Jonas [1 ]
Fleischhacker, Nils [1 ]
Schroeder, Dominique [2 ]
Backes, Michael [1 ,3 ]
机构
[1] Univ Saarland, CISPA, Saarland Informat Campus, D-66123 Saarbrucken, Germany
[2] Friedrich Alexander Univ, Erlangen, Germany
[3] MPI SWS, Saarland Informat Campus, Kaiserslautern, Germany
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
BLIND SIGNATURES; SECURITY; EQUIVALENT;
D O I
10.1145/2976749.2978375
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password authentication still constitutes the most widespread authentication concept on the Internet today, but the human incapability to memorize safe passwords has left this concept vulnerable to various attacks ever since. Aff ected enterprises such as Facebook now strive to mitigate such attacks by involving external cryptographic services that harden passwords. Everspaugh et al. provided the fi rst comprehensive formal treatment of such a service, and proposed the PYTHIA PRF-Service as a cryptographically secure solution (Usenix Security' 15). PYTHIA relies on a novel cryptographic primitive called partially oblivious pseudorandom functions and its security is proven under a strong new interactive assumption in the random oracle model. In this work, we prove that this strong assumption is inherently necessary for the PYTHIA construction, i.e., it cannot be weakened without invalidating the security of PYTHIA. More generally, it is impossible to reduce the security of PYTHIA to any non-interactive assumptions. Hence any efficient, scalable password hardening service that is secure under weaker assumptions necessarily requires a conceptually diff erent construction. To this end, we propose a construction for password hardening services based on a novel cryptographic primitive called partially oblivious commitments, along with an efficient secure instantiation based on simple assumptions. The performance and storage evaluation of our prototype implementation shows that our protocol runs almost twice as fast as PYTHIA, while achieving a slightly relaxed security notion but relying on weaker assumptions.
引用
收藏
页码:1192 / 1203
页数:12
相关论文
共 41 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
[Anonymous], LECT NOTES COMPUTER
[3]  
Armknecht F, 2011, LECT NOTES COMPUT SC, V6544, P320, DOI 10.1007/978-3-642-19574-7_22
[4]  
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433
[5]  
Barthe G, 2014, LECT NOTES COMPUT SC, V8616, P95, DOI 10.1007/978-3-662-44371-2_6
[6]  
Belenkiy M, 2008, LECT NOTES COMPUT SC, V4948, P356, DOI 10.1007/978-3-540-78524-8_20
[7]  
Berson T., 2001, P ISOC NETW DISTR SY
[8]  
Biryukov Alex, 2016, MEMORY HARD IN PRESS
[9]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1403, P59, DOI 10.1007/BFb0054117
[10]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15