Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation

被引:2
作者
Kikuchi, Ryo [1 ]
Chida, Koji [1 ]
Ikarashi, Dai [1 ]
Hamada, Koki [1 ]
机构
[1] NTT Corp, Tokyo, Japan
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2015 | 2015年 / 9476卷
关键词
Password; Authentication; Secret sharing; Multiparty computation; KEY EXCHANGE; SECURE; PRIVACY;
D O I
10.1007/978-3-319-26823-1_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The speed of secret sharing (SS)-based multiparty computation (MPC) has recently increased greatly, and several efforts to implement and use it have been put into practice. Authentication of clients is one critical mechanism for implementing SS-based MPC successfully in practice. We propose a password-based authentication protocol for SS-based MPC. Our protocol is secure in the presence of secure channels, and it is optimized for practical use with SS-based MPC in the following ways. - Threshold security: Our protocol is secure in the honest majority, which is necessary and sufficient since most practical results on SS-based MPC are secure in the same environment. - Establishing distinct channels: After our protocol, a client has distinct secure and two-way authenticated channels to each server, which is necessary for SS-based MPC and different from the usual setting. - Ease of implementation: Our protocol consists of SS and operations involving SS, which can be reused from an implementation of SS-based MPC. Furthermore, we implemented our protocol with an optimization for the realistic network and confirm that the protocol is practical. A client received the result within 2 s even when the network delay was 200 ms, which is almost the delay that occurs between Japan and Europe.
引用
收藏
页码:179 / 196
页数:18
相关论文
共 36 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], 2010, Network
[3]  
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433
[4]  
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[5]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[6]  
Bellare M., 1994, CRYPTO, P232
[7]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[8]  
Bellovin S.M., 1993, CCS 93, P244
[9]   High-performance secure multi-party computation for data mining applications [J].
Bogdanov, Dan ;
Niitsoo, Margus ;
Toft, Tomas ;
Willemson, Jan .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (06) :403-418
[10]  
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192