| Literature DB >> 24977229 |
Junghyun Nam1, Kim-Kwang Raymond Choo2, Junghwan Kim1, Hyun-Kyu Kang1, Jinsoo Kim1, Juryon Paik3, Dongho Won3.
Abstract
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.Entities:
Mesh:
Year: 2014 PMID: 24977229 PMCID: PMC4009152 DOI: 10.1155/2014/825072
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Security proof comparison.
| Protocol | Idealized assumption | Adversary capability | Resistance to UDOD attacks† |
|---|---|---|---|
| Our protocol | None | Not restricted | Proven |
| GPAKE [ | None | Restricted from corrupting parties | No [ |
| NGPAKE [ | None | Not proven | |
| Lin and Hwang [ | Random oracles | Not restricted | Not proven |
| Wu et al. [ | Random oracles | Not restricted | Not proven |
†Resistance to undetectable online dictionary attacks.
Figure 1The proposed three-party PAKE protocol.