Skip to main content

Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting

  • Conference paper
Information Security, Practice and Experience (ISPEC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6047))

  • 681 Accesses

Abstract

In this paper, we extend Abdalla et al. ’s work in Asiacrypt 2005 to group-based setting. Our goal is to allow a group of users to establish a shared session key with a gateway under the assistance of an authentication server, while the server has no information about this session key and the gateway has no information about any password. Distinct to ordinary password-based group key exchange protocols, different shares of a groupwise password are assigned to group users respectively in our protocol. Each share is also a human-memorable password. According to our protocol, a group of at least k (a predefined threshold) users is authorized to establish a key with gateway. Additionally, the new protocol is proven secure in random-oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based Group Key Exchange in a Constant Number of Rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 427–442. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Abdalla, M., Chevassut, O., Fouque, P.A., Pointcheval, D.: A Simple Threshold Authenticated Key Exchange from Short Secrets. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 566–584. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. IET Information Security 153(1), 27–39 (2005)

    Google Scholar 

  4. Abdalla, M., Izabachene, M., Pointcheval, D.: Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 133–148. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Abdalla, M., Pointcheval, D.: A Scalable Password-based Group Key Exchange Protocol in the Standard Model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 332–347. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Bellare, M., Palacio, A.: The Knowledge-of-Exponent Assumptions and 3-round Zero-Knowledge Protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273–289. Springer, Heidelberg (2004)

    Google Scholar 

  8. Bellovin, S.M., Merritt, M.: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise. In: Proceedings of the 1st ACM Conference on Computer and Communication Security, pp. 244–250. ACM, New York (1993)

    Chapter  Google Scholar 

  9. Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange secure against dictionary attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497–514. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Byun, J.W., Jeong, I.R., Lee, D.H., Park, C.-S.: Password-Authenticated Key Exchange between Clients with Different Passwords. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 134–146. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. ACM Transactions on Information and System Security (TISSEC) 9(2), 181–234 (2006)

    Article  Google Scholar 

  13. Gennaro, R.: Faster and Shorter Password-Authenticated Key Exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589–606. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  14. Goldreich, O., Lindell, Y.: Session Key Generation using Human Passwords Only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 408–432. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Jablon, D.P.: Strong Password-Only Authenticated Key Exchange. ACM SIGCOMM Computer Communication Review 26(5), 5–26 (1996)

    Article  Google Scholar 

  16. Katz, J., Ostrovsky, R., Yung, M.: Practical Password-Authenticated Key Exchange Provably Secure under Standard Assumptions. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475–494. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Lin, C.L., Sun, H.M., Hwang, T.: Three-party encrypted key exchange: attacks and a solution. ACM SIGOPS Operating System Review 34(4), 12–20 (2000)

    Article  Google Scholar 

  18. MacKenzie, P., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 18–22. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  19. MacKenzie, P., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. Journal of Cryptology, LNCS 19(1), 27–66 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  20. Patel, S.: Number Theoretic Attacks on Secure Password Schemes. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 236–247 (1997)

    Google Scholar 

  21. Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, LNCS 13, 361–396 (2000)

    Article  MATH  Google Scholar 

  22. Raimondo, M.D., Gennaro, R.: Provably secure threshold password-authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 507–523. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  23. Di Raimondo, M., Gennaro, R.: Provably secure threshold password-authenticated key exchange. Journal of Computer and System Sciences 72(6), 978–1001 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  24. Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 688–689. Springer, Heidelberg (1990)

    Google Scholar 

  25. Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. ACM SIGOPS Operating System Review 29(3), 22–30 (1995)

    Article  Google Scholar 

  26. Sun, H.M., Chen, B.C., Hwang, T.: Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75, 63–68 (2005)

    Article  Google Scholar 

  27. Wu, T.: The Secure Remote Password Protocol. In: Proceedings of the 1998 Internet Society Symposium on Network and Distributed System Security (NDSS 1998), pp. 97–111 (1998)

    Google Scholar 

  28. Wu, S.H., Zhu, Y.F.: Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 69–82. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, H., Wu, CK., Wei, L. (2010). Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12827-1_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12826-4

  • Online ISBN: 978-3-642-12827-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics