Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)

被引:85
作者
Jarecki, Stanislaw [1 ]
Kiayias, Aggelos [2 ]
Krawczyk, Hugo [3 ]
Xu, Jiayu [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA USA
[2] Univ Athens, GR-10679 Athens, Greece
[3] IBM Res, New York, NY USA
来源
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY | 2016年
基金
美国国家科学基金会;
关键词
D O I
10.1109/EuroSP.2016.30
中图分类号
TP301 [理论、方法];
学科分类号
080201 [机械制造及其自动化];
摘要
PPSS is a central primitive introduced by Bagherzandi et al. [2] which allows a user to store a secret among n servers such that the user can later reconstruct the secret with the sole possession of a single password by contacting t + 1 (t < n) servers. At the same time, an attacker breaking into t of these servers - and controlling all communication channels - learns nothing about the secret (or the password). Thus, PPSS schemes are ideal for on-line storing of valuable secrets when retrieval solely relies on a memorizable password. We show the most efficient Password-Protected Secret Sharing (PPSS) to date (and its implied Threshold-PAKE scheme), which is optimal in round communication as in Jarecki et al. [10] but which improves computation and communication complexity over that scheme requiring a single per-server exponentiation for the client and a single exponentiation for the server. As with the schemes from [10] and Camenisch et al. [4] we do not require secure channels or PKI other than in the initialization stage. We prove the security of our PPSS scheme in the Universally Composable (UC) model. For this we present a UC definition of PPSS that relaxes the UC formalism of [4] in a way that enables more efficient PPSS schemes (by dispensing with the need to extract the user's password in the simulation) and present a UC-based definition of Oblivious PRF (OPRF) that is more general than the (Verifiable) OPRF definition from [10] and is also crucial for enabling our performance optimization.
引用
收藏
页码:276 / 291
页数:16
相关论文
共 16 条
[1]
Abe M, 2009, LECT NOTES COMPUT SC, V5912, P435, DOI 10.1007/978-3-642-10366-7_26
[2]
[Anonymous], 2013, IACR
[3]
[Anonymous], 2014, The New York Times
[4]
BAGHERZANDI A, 2011, ACM C COMP COMM SEC, P433
[5]
Camenisch J., CRYPTO 2014, P256
[6]
Camenisch J., COMPUTER COMMUNICATI, P182
[7]
Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[8]
Everspaugh A., USENIX SEC S 2015
[9]
Freedman M. J., THEOR CRYPT C TCC 20
[10]
Hazay C, 2008, LECT NOTES COMPUT SC, V4948, P155, DOI 10.1007/978-3-540-78524-8_10