Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness

被引:0
|
作者
Abdalla, Michel [1 ]
Catalano, Dario [2 ]
Chevalier, Celine [1 ]
Pointcheval, David [1 ]
机构
[1] CNRS INRIA, Ecole Normale Super, Paris, France
[2] Univ Catania, I-95124 Catania, Italy
来源
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009 | 2009年 / 5580卷
关键词
EXCHANGE PROTOCOLS; ESTABLISHMENT; 2-PARTY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Adaptively-secure key exchange allows the establishment of secure channels even in the presence of an adversary that can corrupt parties adaptively and obtain their internal states. In this paper, we give a formal definition of contributory protocols and define an ideal functionality for password-based group key exchange with explicit authentication and contributiveness in the UC framework. As with previous definitions in the same framework, our definitions do not assume any particular distribution on passwords or independence between passwords of different parties. We also provide the first steps toward realizing this functionality in the above strong adaptive setting by analyzing an efficient existing protocol and showing that it realizes the ideal functionality in the random-oracle and ideal-cipher models based on the CDH assumption.
引用
收藏
页码:254 / +
页数:4
相关论文
共 50 条
  • [1] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [2] Universally composable three-party password-authenticated key exchange with contributiveness
    Hu, Xuexian
    Zhang, Zhenfeng
    Zhang, Qihui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (06) : 1100 - 1111
  • [3] Security Analysis of Password-Authenticated Key Retrieval
    Shin, SeongHan
    Kobara, Kazukuni
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (05) : 573 - 576
  • [4] A Simple Balanced Password-Authenticated Key Agreement Protocol
    Liu, Fuwen
    Koenig, Hartmut
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 403 - 408
  • [5] A provably-secure password-authenticated group key agreement in the standard model
    Fu, Xiu
    Xu, Qiuliang
    Wang, Hao
    Journal of Networks, 2009, 4 (08) : 763 - 770
  • [6] A Password-authenticated Key Agreement Scheme for Ad hoc Networks
    Hu Ronglei
    Chi Yaping
    Xu Fenglin
    Wei Zhanzhen
    Li Ran
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2943 - 2947
  • [7] Potential weaknesses of AuthA password-authenticated key agreement protocols
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 580 - 583
  • [8] Password-authenticated cluster-based group key agreement for smart grid communication
    Nicanfar, Hasen
    Leung, Victor C. M.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 221 - 233
  • [9] Password-Authenticated Key Exchange from Group Actions
    Abdalla, Michel
    Eisenhofer, Thorsten
    Kiltz, Eike
    Kunzweiler, Sabrina
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 699 - 728
  • [10] Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange
    Nam, Junghyun
    Paik, Juryon
    Won, Dongho
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 865 - 868