Anonymous Password Authenticated Key Exchange Protocol in the Standard Model

被引:0
作者
Xuexian Hu
Jiang Zhang
Zhenfeng Zhang
Fengmei Liu
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing,Trusted Computing and Information Assurance Laboratory, Institute of Software
[2] State Key Laboratory of Cryptology,undefined
[3] Chinese Academy of Science,undefined
[4] Science and Technology on Information Assurance Laboratory,undefined
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
Password authentication; Anonymous authentication; Key exchange protocol; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymous password authenticated key exchange (APAKE) allows a client holding a low-entropy password to establish a session key with a server in an authenticated and anonymous way. As a very convenient solution for personal privacy protection, it has attracted much attention in recent years. However, almost all existing APAKE protocols are designed in the random oracle model. In this paper, we propose the first password-only APAKE protocol (called APAKE-S) with proven security in the standard model, i.e., without random oracle heuristic. The resulting protocol guarantees AKE security, client anonymity and mutual authentication. Moreover, since the building blocks in our construction can be instantiated based on numerous hard assumptions (e.g., decisional Diffie–Hellman, Quadratic Residuosity, and N-residuosity assumptions), our APAKE-S protocol is actually a generic construction which implies a series of efficient APAKE protocols in the standard model.
引用
收藏
页码:1451 / 1474
页数:23
相关论文
共 62 条
  • [1] Wang D(2015)Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment IEEE Transactions on Dependable and Secure Computing 12 428-442
  • [2] He D(2016)A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing IEEE Transactions on Information Forensics and Security 11 2594-2608
  • [3] Wang P(2016)A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data IEEE Transactions on Parallel and Distributed Systems 27 340-352
  • [4] Chu C(2016)Enabling personalized search over encrypted outsourced data with efficiency improvement IEEE Transactions on Parallel and Distributed Systems 27 2546-2559
  • [5] Xia Z(2015)Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing IEICE Transactions on Communications 98 190-200
  • [6] Wang X(2015)Social network and tag sources based augmenting collaborative recommender system IEICE Transactions on Information and Systems 98 902-910
  • [7] Zhang L(2007)Anonymous authentication Journal of Privacy and Confidentiality 2 35-63
  • [8] Qin Z(2017)Universally composable anonymous password authenticated key exchange Science China Information Sciences 60 52107-1506
  • [9] Sun X(2014)An efficient ticket based authentication protocol with unlinkability for wireless access networks Wireless Personal Communications 77 1489-26
  • [10] Ren K(1996)Strong password-only authenticated key exchange SIGCOMM Computer Communication Review 26 5-1393