Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication

被引:13
作者
Catalano, Dario [1 ]
Pointcheval, David
Pornin, Thomas
机构
[1] Ecole Normale Super, CNRS, LIENS, Paris, France
[2] Cryptolog, Paris, France
关键词
password-based key exchange; trapdoor; isomorphism;
D O I
10.1007/s00145-006-0431-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their passwords or pass-phrases. For this reason it is very desirable to have protocols that do not require long passwords to guarantee security, even in the case in which exhaustive search is feasible. This is actually the goal of password-based key exchange protocols, secure against off-line dictionary attacks: two people share a password (possibly a very small one, say a 4-digit number), and after the protocol execution, they end up sharing a large secret session key (known to both of them, but nobody else). Then an adversary attacking the system should try several connections (on average 5000 for the above short password) in order to be able to get the correct password. Such a large number of erroneous connections can be prevented by various means. Our results can be highlighted as follows. First we define a new primitive that we call trapdoor hard-to-invert group isomorphisms, and give some candidates. Then we present a generic password-based key exchange construction that admits a security proof assuming that these objects exist. Finally, we instantiate our general scheme with some concrete examples, such as the Diffie-Hellman function and the RSA function, but more interestingly the modular square-root function, which leads to the first scheme with security related to the integer factorization problem. Furthermore, the latter variant is very efficient for one party (the server). Our results bold in the random-oracle model.
引用
收藏
页码:115 / 149
页数:35
相关论文
共 31 条
  • [1] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [2] Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
  • [3] BELLARE M, 2000, IEEE P1363 MARCH
  • [4] Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
  • [5] Boyd C, 2001, LECT NOTES COMPUT SC, V2119, P487
  • [6] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [7] Bresson E, 2004, LECT NOTES COMPUT SC, V2947, P145
  • [8] Bresson E., 2003, P 10 ACM C COMP COMM, P241, DOI DOI 10.1145/948109.948142
  • [9] Catalano D, 2004, LECT NOTES COMPUT SC, V3152, P477
  • [10] DESANTIS A, 2001, LNCS, V2139, P566