| Literature DB >> 25309956 |
Junghyun Nam1, Kim-Kwang Raymond Choo2, Juryon Paik3, Dongho Won3.
Abstract
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.Entities:
Mesh:
Year: 2014 PMID: 25309956 PMCID: PMC4189515 DOI: 10.1155/2014/802359
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Figure 1GPAKE: Abdalla et al.'s generic 3-party PAKE protocol [8, 9].
Figure 2The PPK protocol [32].
Figure 3The 3PKD protocol [35].
Figure 4The OMDHKE protocol [34].
Box 1
Figure 5H3PAKE: our proposed generic 3-party PAKE protocol.
Box 2
Box 3