Threshold password-authenticated key exchange

被引:32
作者
MacKenzie, P [1 ]
Shrimpton, T
Jakobsson, M
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Portland State Univ, Dept Comp Sci, Portland, OR 97207 USA
[3] Indiana Univ, Sch Informat, Bloomington, IN 47408 USA
关键词
password authentication; key exchange; threshold cryptosystems; dictionary attack;
D O I
10.1007/s00145-005-0232-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In most password-authenticated key exchange systems there is a single server storing password verification data. To provide some resilience against server compromise, this data typically takes the form of a one-way function of the password (and possibly a salt, or other public values) rather than the password itself. However, if the server is compromised, this password verification data can be used to perform an off-line dictionary attack on the user's password. In this paper we propose an efficient password-authenticated key exchange system involving a set of servers with known public keys, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that threshold of servers does not allow an attacker to perform an off-line dictionary attack. We prove our system is secure in the random oracle model under the Decision Diffie-Hellman assumption against an attacker that may eavesdrop on, insert, delete, or modify messages between the user and servers, and that compromises fewer than that threshold of servers.
引用
收藏
页码:27 / 66
页数:40
相关论文
共 38 条
  • [1] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [2] Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
  • [3] Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
  • [4] Bellare M., 1995, P 1 ACM C COMPUTER C, P62
  • [5] Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
  • [6] Bellovin SM, 1993, P CCS, P244
  • [7] Blum M., 1988, P 20 ANN ACM S THEOR, P103, DOI DOI 10.1145/62212.62222
  • [8] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [9] Boyd C., 1986, CRYPTOGRAPHY CODING, P241
  • [10] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156