Skip to main content

Advertisement

Log in

Quantum-safe multi-server password-based authenticated key exchange protocol

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Password-based authentication is one of the most prevailing access control mechanism. Typical password-authenticated key exchange (PAKE) protocols are single-server settings and are therefore vulnerable to server compromise attack. To defend against such attack, multi-server PAKE schemes have been advanced, but most of which are built on non-quantum-secure hardness assumptions. Lattice-based cryptosystems are regarded as the most promising one for post-quantum eara by NIST, while the known multi-server password-based authentication solution over lattices achieves merely key transport and is public key infrastructure (PKI)-based, resulting in low efficiency and poor deployability. In this work, we resort to distributed smooth projective hash function (SPHF) to bridge the gap between multi-server PAKE protocol and quantum-security. We first design an exact SPHF and derive the first distributed SPHF over lattices by leveraging the additive homomorphic property of the strong learning with errors (LWE) problem. In particular, the relevant parameters of the public key encryption (PKE) scheme it predicates on are identified, thus eliminating the influence of incomplete lattice homomorphism on the correctness of our SPHFs. Pertinent lattice-based multi-server PAKE protocols are further proposed on both transparent and non-transparent transmission modes by integrating our distributed SPHF into the multi-server framework of Raimondo and Gennaro (EUROCRYPT’03). Our PAKE constructions are able to resist both quantum and sever compromise attacks as well as avoid the expensive cryptographic primitives, including non-interactive zero knowledge (NIZK) proofs, signature/verification, secret sharing and fully homomorphic encryption. Experimental results demonstrate that our SPHFs and PAKE protocols offer better efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3

Similar content being viewed by others

Data Availability Statement

The extra data used to support the findings of this study are available from the corresponding author. Email: chenlin20230522@126.com

References

  1. Shin JS, Jo M, Hwang JY, Lee J (2021) A verifier-based password-authenticated key exchange using tamper-proof hardware. Comput J 64(8):1293–1302

  2. Li Z, Wang D (2019) Achieving one-round password-based authenticated key exchange over lattices. IEEE transactions on services computing. https://doi.org/10.1109/TSC.2019.2939836

  3. Hassan A, Shukur Z, Hasan MK (2020) An improved time-based one time password authentication framework for electronic payments. Int J Adv Comput Sci Appl 11(11):359–366

    Google Scholar 

  4. Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826–3849

    Article  Google Scholar 

  5. Sharma G, Kalra S (2019) Advanced multi-factor user authentication scheme for e-governance applications in smart cities. Int J Comput Appl 41(4):312–327

    Google Scholar 

  6. Wang Q, Wang D, Cheng C, He D (2021) Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Trans Dependable Secure Comput 20(1):193–208

  7. Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput 15(4):708–722

    Google Scholar 

  8. Sulavko AE, Volkov DA, Zhumazhanova SS, Borisov RV (2018) Subjects authentication based on secret biometric patterns using wavelet analysis and flexible neural networks. In: 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE). IEEE, pp 218–227

  9. Scaria BA, Megalingam RK (2018) Enhanced e-commerce application security using three-factor authentication. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, pp 1588–1591

  10. Chen D, Zhang N, Qin Z, Mao X, Qin Z, Shen X, Li X-Y (2016) S2m: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J 4(1):88–100

    Article  Google Scholar 

  11. Thavalengal S, Bigioi P, Corcoran P (2015) Iris authentication in handheld devices-considerations for constraint-free acquisition. IEEE Trans Consum Electron 61(2):245–253

    Article  Google Scholar 

  12. Wang D (2017) Research on key issues in password security. PhD thesis, Peking University, Beijing

  13. RockYou2021 (2021) Largest Password Compilation of All Time Leaked Online with 8.4 Billion Entries. https://github.com/ohmybahgosh/RockYou2021.txt

  14. Singh A, Raj S (2019) Securing password using dynamic password policy generator algorithm. J King Saud Univ-Comput Inf Sci 34(4):1357–1361

  15. Dwyer C (2011) Privacy in the age of google and facebook. IEEE Technol Soc Mag 30(3):58–63

    Article  Google Scholar 

  16. Zeebaree S, Ameen S, Sadeeq M (2020) Social media networks security threats, risks and recommendation: a case study in the Kurdistan region. Int J Innov Creat Chang 13:349–365

    Google Scholar 

  17. Meli M, McNiece MR, Reaves B (2019) How bad can it git? characterizing secret leakage in public github repositories. In: NDSS

  18. Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144–150

    Article  Google Scholar 

  19. Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science. IEEE, pp 124–134

  20. Agarkar A, Agrawal H (2019) A review and vision on authentication and privacy preservation schemes in smart grid network. Secur Priv 2(2):e62

  21. Ye M (2013) Research on password-based authenticated key exchange protocols and associated encryption algorithms from lattices. PhD thesis, Information Engineering University, Zhengzhou

  22. Li Z, Wang D, Morais E (2020) Quantum-safe round-optimal password authentication for mobile devices. IEEE Trans Dependable Secure Comput 19(3):1885–1899

  23. Alagic G, Alperin-Sheriff J, Apon D, Cooper D, Dang Q, Kelsey J, Liu Y-K, Miller C, Moody D, Peralta R et al (2020) Status report on the second round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST

    Google Scholar 

  24. Asif R (2021) Post-quantum cryptosystems for internet-of-things: a survey on lattice-based algorithms. IoT 2(1):71–91

    Article  Google Scholar 

  25. Peikert C, Vaikuntanathan V, Waters B (2008) A framework for efficient and composable oblivious transfer. In: Wagner D (ed) Annual International Cryptology Conference, vol 5157. Springer, LNCS, pp 554–571

    Google Scholar 

  26. Alaya B, Laouamer L, Msilini N (2020) Homomorphic encryption systems statement: trends and challenges. Comput Sci Rev 36:100235

    Article  MathSciNet  Google Scholar 

  27. Yin A, Guo Y, Song Y, Qu T, Fang C (2020) Two-round password-based authenticated key exchange from lattices. Wirel Commun Mob Comput 2020:1–13

  28. Benhamouda F, Blazy O, Ducas L, Quach W (2018) Hash proof systems over lattices revisited. In: Abdalla M, Dahab R (eds) IACR International Workshop on Public Key Cryptography, vol 10770. Springer, LNCS, pp 644–674

    Google Scholar 

  29. Zhang C, Luo X, Fan Q, Wu T, Zhu L (2023) Enabling privacy-preserving multi-server collaborative search in smart healthcare. Futur Gener Comput Syst 143:265–276

    Article  Google Scholar 

  30. Roy PS, Dutta S, Susilo W, Safavi-Naini R (2021) Password protected secret sharing from lattices. In: Sako K, Tippenhauer NO (eds) International Conference on Applied Cryptography and Network Security, vol 12726. Springer, LNCS, pp 442–459

    Chapter  Google Scholar 

  31. Yi X, Rao F-Y, Tari Z, Hao F, Bertino E, Khalil I, Zomaya AY (2016) Id2s password-authenticated key exchange protocols. IEEE Trans Comput 65(12):3687–3701

    MathSciNet  Google Scholar 

  32. Yi X, Hao F, Bertino E (2014) Id-based two-server password-authenticated key exchange. In: Kutylowski M, Vaidya J (eds) European Symposium on Research in Computer Security, vol 8713. Springer, LNCS, pp 257–276

    Google Scholar 

  33. Katz J, Ostrovsky R, Yung M (2001) Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann B (ed) International Conference on the Theory and Applications of Cryptographic Techniques, vol 2045. Springer, LNCS, pp 475–494

    Google Scholar 

  34. Gennaro R, Lindell Y (2006) A framework for password-based authenticated key exchange1. ACM Trans Inf Syst Secur (TISSEC) 9(2):181–234

    Article  Google Scholar 

  35. Jiang S, Gong G (2004) Password based key exchange with mutual authentication. In: Handschuh H, A H (eds) International Workshop on Selected Areas in Cryptography, vol 3357. LNCS, Springer, pp 267–279

  36. Groce A, Katz J (2010) A new framework for efficient password-based authenticated key exchange. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525

  37. Abdalla M, Benhamouda F, Pointcheval D (2015) Public-key encryption indistinguishable under plaintext-checkable attacks. In: Katz J (ed) IACR International Workshop on Public Key Cryptography, vol 9020. Springer, LNCS, pp 332–352

    Google Scholar 

  38. Katz J, Vaikuntanathan V (2011) Round-optimal password-based authenticated key exchange. In: Ishai Y (ed) Theory of Cryptography Conference, vol 6597. Springer, LNCS, pp 293–310

    Chapter  Google Scholar 

  39. Li, Z., Wang D (2018) Two-round PAKE protocol over lattices without NIZK. In: Guo F, Huang X, M Y (eds) International Conference on Information Security and Cryptology, vol 11449. LNCS, Springer, pp 138–159

  40. Zhang J, Yu Y (2017) Two-round PAKE from approximate SPH and instantiations from lattices. In: Takagi T, Peyrin T (eds) International Conference on the Theory and Application of Cryptology and Information Security, vol 10626. Springer, LNCS, pp 37–67

    Google Scholar 

  41. Cramer R, Shoup V (2002) Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen L (ed) International Conference on the Theory and Applications of Cryptographic Techniques, vol 2332. Springer, LNCS, pp 45–64

    Google Scholar 

  42. Katz J, Vaikuntanathan V (2009) Smooth projective hashing and password-based authenticated key exchange from lattices. In: Matsui M (ed) International Conference on the Theory and Application of Cryptology and Information Security, vol 5912. Springer, LNCS, pp 636–652

    Google Scholar 

  43. Blazy O, Chevalier C, Ducas L, Pan J (2013) Exact smooth projective hash function based on LWE. Cryptol ePrint Archive, Report 2013(821)

  44. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 139–155

  45. Di Raimondo M, Gennaro R (2003) Provably secure threshold password-authenticated key exchange. In: Biham E (ed) International Conference on the Theory and Applications of Cryptographic Techniques, vol 2656. Springer, LNCS, pp 507–523

    Google Scholar 

  46. Katz J, MacKenzie P, Taban G, Gligor V (2005) Two-server password-only authenticated key exchange. In: Ioannidis J, Keromytis A, Yung M (eds) International Conference on Applied Cryptography and Network Security, vol 3531. Springer, LNCS, pp 1–16

    Chapter  Google Scholar 

  47. Ding Y, Fan L (2011) Efficient password-based authenticated key exchange from lattices. In: 2011 Seventh International Conference on Computational Intelligence and Security. IEEE, pp 934–938

  48. Zhang J, Yu Y, Fan S, Zhang Z (2020) Improved lattice-based cca2-secure PKE in the standard model. Sci China Inf Sci 63(8):1–22

    Article  MathSciNet  Google Scholar 

  49. Peikert C (2015) A decade of lattice cryptography. Found Trends Theor C 10(4):83–424

  50. Banerjee A, Peikert C, Rosen A (2012) Pseudorandom functions and lattices. In: Pointcheval D, Johansson T (eds) Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol 7237. Springer, LNCS, pp 719–737

    Google Scholar 

  51. Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp 197–206

  52. Peikert C, Waters B (2011) Lossy trapdoor functions and their applications. SIAM J Comput 40(6):1803–1844

    Article  MathSciNet  Google Scholar 

  53. Peikert C (2009) Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, pp 333–342

  54. Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h) IBE in the standard model. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 553–572

  55. Yamada S (2016) Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 32–62

  56. Canetti R, Halevi S, Katz J (2004) Chosen-ciphertext security from identity-based encryption. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 207–222

  57. Boneh D, Katz J (2005) Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Cryptographers Track at the RSA Conference. Springer, pp 87–103

  58. Lyubashevsky V, Micciancio D (2008) Asymptotically efficient lattice-based digital signatures. In: Theory of Cryptography Conference. Springer, pp 37–54

  59. Micciancio D, Peikert C (2012) Trapdoors for lattices: simpler, tighter, faster, smaller. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 700–718

  60. Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipfs law in passwords. IEEE Trans Inf Forensic Secur 12(11):2776–2791

    Article  Google Scholar 

  61. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Preneel B (ed) International Conference on the Theory and Applications of Cryptographic Techniques. LNCS, vol 1807. Springer, pp 139–155

  62. Boneh D, Dagdelen Ö, Fischlin M, Lehmann A, Schaffner C, Zhandry M (2011) Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 41–69

  63. Longa P, Naehrig M (2016) Speeding up the number theoretic transform for faster ideal lattice-based cryptography. In: International Conference on Cryptology and Network Security. Springer, pp 124–139

  64. Ding J, Alsayigh S, Lancrenon J, RV S, Snook M (2017) Provably secure password authenticated key exchange based on RLWE for the post-quantum world. In: Cryptographers Track at the RSA Conference. Springer, pp 183–204

  65. Ebrahimi Atani R, Ebrahimi Atani S, Hassani Karbasi A (2019) A new ring-based SPHF and PAKE protocol on ideal lattices. ISC Int J Inf Secur 11(1):75–86

    Google Scholar 

Download references

Acknowledgements

The authors are grateful to the anonymous reviewers for their invaluable comments. Chen Lin is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lin Chen.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A: Correctness and smoothness proofs for WI-eSPHF

Correctness proof. According to the definition of SPHF in Section 2.3, to prove the correctness of WI-eSPHF, we need to prove that for \(\forall \text { }{} {\textbf {W}}\in \mathbb {L}\), Eq. 13 holds.

$$\begin{aligned} \textrm{Pr}(h=ph)\gg 1-\textrm{negl}(\kappa ) \end{aligned}$$
(13)

And according to the definition of WI-eSPHF in Section 4, we only need to prove \(\textrm{Pr}({h}_{i}={ph}_{i})\gg 1-\textrm{negl}(\kappa )\). Further, according to Eqs. 89 and the definition of \(\textrm{ECC}\) in Section 2.3, we need to prove

$$\begin{aligned} \textrm{Pr}({h}_{i}^{1}={ph}_{i}^{1})\gg 1-\textrm{negl}(\kappa ). \end{aligned}$$
(14)

Below, we prove that Eq. 14 holds.

$$\begin{aligned} \begin{array}{ll} {h}_{i}^{1}&{}=~{({{\textbf {c}}}_{1}+{{\textbf {c}}}_{2}||{\textbf {0}})}^{T } \cdot {kh}_{i}(\textrm{mod }q)\\ &{}=~(({{\textbf {A}}}^{T }\cdot \tilde{{\textbf {s}}}+{{\textbf {e}}}_{1})+({({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})}^{T }\cdot \tilde{{\textbf {s}}}\\ &{}~{+{{\textbf {e}}}_{2})||{\textbf {0}})}^{T } \cdot {kh}_{i}(\textrm{mod }q)\\ &{}=~{({({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})|{\textbf {0}})}^{T }\cdot \tilde{{\textbf {s}}})}^{T }\\ &{}~\cdot {kh}_{i}(\textrm{mod }q)+{({{\textbf {e}}}_{1}+{{\textbf {e}}}_{2}||{\textbf {0}})}^{T } \cdot {kh}_{i}(\textrm{mod }q)\\ &{}\approx ~~{\tilde{{\textbf {s}}}}^{T }\cdot ({({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})|{\textbf {0}})}^{T }\\ &{}~\cdot {kh}_{i})(\textrm{mod }q)\\ &{}=~{\tilde{{\textbf {s}}}}^{T }\cdot {kp}_{i}(\textrm{mod }q) = {kp}_{i}^{T }\cdot \tilde{{\textbf {s}}}(\textrm{mod }q)\\ &{}=~{ph}_{i}^{1}\\ \end{array} \end{aligned}$$
(15)

In accordance with the parameter settings of \(\textrm{ZYF}\) scheme [48], \(\bar{m}<m\) and \(nk<m\). Then, we have \(|{({{\textbf {e}}}_{1}+{{\textbf {e}}}_{2}||{\textbf {0}})}^{T }\cdot {kh}_{i}|\le s\cdot (\alpha q+ \gamma )\cdot m\). And according to the parameter settings of the strong LWE problem in Definition 3, \(s=q/{2}^{\Omega (\sqrt{n})}\), \(m=O(n \textrm{log }q)\). Finally, since Eqs. 10 and 12 holds, we have \(4\cdot |{({{\textbf {e}}}_{1}+{{\textbf {e}}}_{2}||{\textbf {0}})}^{T }\cdot {hk}_{i}|/q \le \textrm{negl}(\kappa )\).

Consequently, we prove that \(\textrm{WI}\)-\(\textrm{eSPHF}\) is corret.

Proof of smoothness. For the property of smoothness, we need to proof that for \(\forall ~{\textbf {W}}\in \mathbb {X}/\mathbb {L}\), the two distributions (i.e., \((HP, \textrm{HASH}({\textbf {W}}, KH))\) and \((HP, {\textbf {v}}\overset{r }{\leftarrow }{\{0,1\}}^{l})\)) are statistically close. And according to Eq. 15, we have \({h}_{i}^{1}={({({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})|{\textbf {0}})}^{T }\cdot \tilde{{\textbf {s}}})}^{T }\cdot {kh}_{i}+\) \({({{\textbf {e}}}_{1}+{{\textbf {e}}}_{2}||{\textbf {0}})}^{T }\cdot {kh}_{i}\). Since the projection key \({kp}_{i}\) is \(({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})|{\textbf {0}})\) and the witness \(\tilde{{\textbf {s}}}\) is random, the adversary can learn no information about \({h}_{i}^{1}\) even if the projection key is public. Then, \(h=({h}_{1}, \cdots , {h}_{l})\) is a random distribution on \({\{0, 1\}}^{l}\). Thus, \(\textrm{WI}\)-\(\textrm{eSPHF}\) has the property of smoothness.

In summary, \(\textrm{WI}\)-\(\textrm{eSPHF}\) is a SPHF.

Appendix B: Correctness and smoothness proofs for \(\mathrm {{\textbf {dist}}}\)-\(\mathrm {{\textbf {SPHF}}}\)

 Correctness proof. For distributed SPHF, the correctness means that the hash value computed by one participate with the hash key can also be computed cooperatively by multiple other participates with their respective projection hash values. Our correctness proof for \(\textrm{dist}\)-\(\textrm{SPHF}\) is based on that of \(\textrm{WI}\)-\(\textrm{eSPHF}\) in Appendix A. Under the parameter settings of \(\textrm{dist}\)-\(\textrm{SPHF}\) (i.e., \(N=\textrm{ploy}(\kappa )\), where N is the number of authentication servers and \(\kappa \) is the security parameter), for \(\textrm{dist}\)-\(\textrm{SPHF}\) we can prove that

$$\begin{aligned} \begin{array}{ll} {h}_{i}^{1}&{}=\sum \nolimits _{k=1}^{N}{{h}_{i}^{k,1}}\\ &{}=\sum \nolimits _{k=1}^{N}{{({(({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})|{\textbf {0}})}^{T }\cdot \tilde{{\textbf {s}}})}^{T }}\\ &{}~~~~~~~~~\cdot {kh}_{i}^{k}+{({{\textbf {e}}}_{1}+{{\textbf {e}}}_{2}||{\textbf {0}})}^{T }\cdot {kh}_{i}^{k})(\textrm{mod }q)\\ &{}\approx \sum \nolimits _{k=1}^{N}{{\tilde{{\textbf {s}}}}^{T }\cdot ({({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag )\cdot {{\textbf {G}}}_{b})|{\textbf {0}})}^{T }}\\ &{}~~~~~~~~~\cdot {kh}_{i}^{k})(\textrm{mod }q)\\ &{}=\sum \nolimits _{k=1}^{N}{{\tilde{{\textbf {s}}}}_{k}^{T }\cdot {kp}_{i}^{k}}(\textrm{mod }q)\\ &{}=\sum \nolimits _{k=1}^{N}{{({kp}_{i}^{k})}^{T }\cdot {\tilde{{\textbf {s}}}}_{k}}(\textrm{mod }q)\\ &{}=\sum \nolimits _{k=1}^{N}{{ph}_{i}^{k,1}}(\textrm{mod }q)={ph}_{i}^{1}\\ \end{array}. \end{aligned}$$
(16)

Therefore, \(\textrm{dist}\)-\(\textrm{SPHF}\) is correct.

Proof of smoothness. According to Eq. 16, we have

$$\begin{aligned} \begin{array}{ll} {h}_{i}^{1}&{}=\sum \nolimits _{k=1}^{N}{{({(({\textbf {A}}+({\textbf {B}}+\textrm{FRD}(tag)\cdot {{\textbf {G}}}_{b})|{\textbf {0}})}^{T }\cdot \tilde{{\textbf {s}}})}^{T }}\\ &{}~~~~~~~~~\cdot {kh}_{i}^{k}+{({{\textbf {e}}}_{1}+{{\textbf {e}}}_{2}||{\textbf {0}})}^{T }\cdot {kh}_{i}^{k})(\textrm{mod }q)\\ \end{array}. \end{aligned}$$
(17)

Based on the security proof of \(\textrm{WI}\)-\(\textrm{eSPHF}\) in Appendix A, for \(k\in [1, N]\), \({h}_{i}^{k,1}\) is secure even if \({kp}_{i}^{k}\) is public, and \({kp}_{i}^{k}\) (\(k\in [1, N]\)) are independent of each other. It is easy to conclude that dist-SPHF has the property of smoothness.

In conclusion, \(\textrm{dist}\)-\(\textrm{SPHF}\) is a distributed SPHF.

Appendix C: Correctness and security proofs for \(\mathrm {{\textbf {t}}}\)-\(\mathrm {{\textbf {Multi}}}\)-\(\mathrm {{\textbf {PAKE}}}\)

 Correctness proof. For correctness, we need to prove that the session keys computed by the user side and by the server side are equal, i.e., \({sk}_{U}={sk}_{S}\). First, according to the correctness of \(\textrm{dist}\)-\(\textrm{SPHF}\), Eq. 18 holds statistically.

$$\begin{aligned} \left\{ \begin{array}{ll} &{}{h}_{U}={ph}_{S}=\sum \nolimits _{k=1}^{N}{{ph}_{S}^{k}}\\ &{}{ph}_{U}={h}_{S}=\sum \nolimits _{k=1}^{N}{{h}_{S}^{k}}\\ \end{array}\right. \end{aligned}$$
(18)

And in line with the definitions of \({sk}_{U}\) and \({sk}_{S}\) in Algorithm 2, we have

$$\begin{aligned} \begin{array}{ll} {sk}_{U}&{}={h}_{U}\oplus {ph}_{U}={ph}_{S}\oplus {h}_{S}\\ &{}=\sum \nolimits _{k=1}^{N}{{ph}_{S}^{k}} \oplus \sum \nolimits _{k=1}^{N}{{h}_{S}^{k}}\\ &{}=\sum \nolimits _{k=1}^{N}{({h}_{S}^{k} \oplus {ph}_{S})}\\ &{}=\sum \nolimits _{k=1}^{N}{{sk}_{S}^{k}}\\ &{}={sk}_{S} \end{array}. \end{aligned}$$
(19)

Thus, \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is correct.

Security proof. Our security proof for \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) follows the approaches of Raimondo and Gennaro [45] (i.e., Proof of security for Dist-KOY1 in Appendix C in [45]). Our main work for this proof is to show that the cryptographic primitives we employ, including \(\textrm{ZYF}\) scheme and \(\textrm{dist}\)-\(\textrm{SPHF}\), satisfy the same properties as the corresponding primitives of \(\textrm{Dist}\)-\(\textrm{KOY1}\) in [45]. In Appendix B, we have given the correctness and security proofs of \(\textrm{dist}\)-\(\textrm{SPHF}\), below we concentrate on the formal security proof of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\). According to the definition of transparently secure PAKE protocol in Section 3, we need to prove:

  1. 1.

    if there is no server compromised, then both the user’s password and session key are secure;

  2. 2.

    if the number of the compromised servers is at most \((N-1)\), where N is the number of the authentication servers, the user’s password remains secure.

Case (1) is easily argued: if an adversary in a multi-server PAKE protocol, called a distributed adversary, never breaks into any server, the security proof of the multi-server PAKE protocol will follow that of the corresponding single-server protocol. Thus, if \(\textrm{ePAKE}\) is secure then \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is secure. The reason is that a distributed adversary has the same abilities in this case as a centralized adversary (i.e., an adversary in a single-server protocol).

We prove the security of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) in case (2) by an indistinguishability argument. Before giving the formal argument, we first sketch the main idea. Assume that \(\mathcal {A}\) is a PPT adversary attacking \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), and let \(\textrm{Sim}\) denote a simulator that simulates the whole \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) for \(\mathcal {A}\). We need to prove that if \(\mathcal {A}\) can distinguish between \(\textrm{view}\)(pw) and \(\textrm{view}\)(\(pw'\)), the meanings of which are given in Definition 2, then \(\textrm{Sim}\) can distinguish pw from \(pw'\), indicating that \(\textrm{Sim}\) can break \(\textrm{ZYF}\) scheme in [48]. Since the strong LWE assumption holds (The strong LWE assumption is stronger than the LWE assumption, thus if the latter assumption holds then the formal holds.), \(\textrm{ZYF}\) scheme [48] is IND-CCA2 secure. Thus, \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is a transparently secure PAKE protocol. In addition, according to the security model in Section 3, if \(\mathcal {A}\) sees less than \((N-1)\) shares of a user’s password, then the password remains secret, thus the following argument ignores this. Below, we discuss two cases in which the user is honest and dishonest, respectively.

1) Honest user

In this case, if \(\textrm{Sim}\) utilizes a valid password pw, then the view of \(\mathcal {A}\) (i.e., \(\textrm{view}(pw)\)) includes the session key of the authentication serves (i.e., \({sk}_{S}\)), the message sent by the user (i.e., \((U, {{\textbf {C}}}_{U}=({{\textbf {c}}}_{1U}, {{\textbf {c}}}_{2U}, {c}_{3U}, {c}_{4U}), {kp}_{U})\)) and the message sent by the authentication servers (i.e., \((S, {{\textbf {C}}}_{S}=({{\textbf {c}}}_{1S}, {{\textbf {c}}}_{2S}, {c}_{3S}, {c}_{4S}), {kp}_{S})\)). Below, we show that if \(\textrm{ZYF}\) scheme [48] is IND-CCA2 secure then \(\textrm{view}(pw)\) and \(\textrm{view}(pw')\) are indistinguishable.

Given the public key \(({\textbf {A}}, {\textbf {B}})\), public primitive matrix \({{\textbf {G}}}_{b}\) and ciphertext \({\textbf {C}}=({{\textbf {c}}}_{1}, {{\textbf {c}}}_{2}, {c}_{3}, {c}_{4})\) of \(\textrm{ZYF}\) scheme [48] as well as a projection key KP, where \({\textbf {C}}\) may be generated by a valid password pw or an invalid password \(pw'\), \(\textrm{Sim}\) simulates \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) for \(\mathcal {A}\) as follows:

  1. 1.

    \(\textrm{Sim}\) runs the adversary \(\mathcal {A}\) and simulates the honest user according to the definition of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), i.e., \(\textrm{Sim}\) computes \({{\textbf {C}}}_{U}=({{\textbf {c}}}_{1U}, {{\textbf {c}}}_{2U}, {c}_{3U}, {c}_{4U})\) and \({KP}_{U}\) according to Algorithm 2;

  2. 2.

    On the server side, assume that \(\mathcal {A}\) has broken into the first \((N-1)\) authentication servers. In this case, \(\textrm{Sim}\) can simulate the execution of the Nth authentication server by setting \({{\textbf {c}}}_{1S}^{N}={{\textbf {c}}}_{1}, {{\textbf {c}}}_{2S}^{N}={{\textbf {c}}}_{2}, {c}_{3S}^{N}={c}_{3}, {c}_{4S}^{N}={c}_{4}\) and \({kp}_{S}^{N}=kp\).

  3. 3.

    \(\textrm{Sim}\) computes \({h}_{U}, {ph}_{U}\) for the user and \({h}_{S}^{N}, {ph}_{S}^{N}, {sk}_{S}^{N}\) for the Nth server according to the definition of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\).

  4. 4.

    \(\textrm{Sim}\) computes \({sk}_{U}={h}_{u} \oplus {ph}_{U}\) for the user and cooperates with other authentication servers (i.e., the first \((N-1)\) servers) to compute \({sk}_{S}^{N}\) for the Nth authentication server.

Thus, if the adversary \(\mathcal {A}\) can distinguish \(\textrm{view}(pw)\) and \(\textrm{view}(pw')\) then \(\textrm{Sim}\) is feasible to distinguish pw and \(pw'\), which means that \(\textrm{ZYF}\) scheme [48] is broken. However, since the strong LWE assumption holds, \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is a transparently secure PAKE protocol.

2) Dishonest user

Now, assume that the user is dishonest, i.e., the adversary \(\mathcal {A}\) impersonates a real user. Below, let \({msg}_{1}\) denote the first message of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), i.e., \({msg}_{1}=(U, {\textbf{C}}_{U}=({{\textbf {c}}}_{1U}, {{\textbf {c}}}_{2U}, {c}_{3U}, {c}_{4U}), {KP}_{U}))\), which may be generated by \(\mathcal {A}\) or a previous oracle. \({msg}_{1}\) is valid if it was constructed according to \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\). We assume that \({msg}_{1}\) is always valid if it was constructed by a previous oracle. Besides \(\textrm{Sim}\) is able to tell whether \({msg}_{1}\) is generated by a previous oracle as all such messages are stored. Furthermore, to simulate the execution of the whole \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) for \(\mathcal {A}\), \(\textrm{Sim}\) first generates the public/private key pair \(({pk}_{\textrm{ZYF}}, {sk}_{\textrm{ZYF}})\) according to \(\textrm{ZYF}\) scheme [48], where \({sk}_{\textrm{ZYF}}\) will be utilized to check the validity of \({msg}_{1}\) generated by \(\mathcal {A}\). We emphasize that \({sk}_{\textrm{ZYF}}\) is only required in the security proof, but not in a real-world protocol execution. To start with, we prove the following three lemmas.

Lemma 1

If \(\textrm{dist}\)-\(\textrm{SPHF}\) is a SPHF and the first message (i.e., \({msg}_{1}\)) of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is invalid , then \({sk}_{S}\) is indistinguishable from a random session key.

Proof. Since \({msg}_{1}\) is invalid for a valid password \({pw}_{U}\), we have \({{\textbf {W}}}_{U}\!=\!({label}_{U}, {{\textbf {C}}}_{U}, \) \( {pw}_{U}) \in \mathbb {X}/\mathbb {L}\). Then, according to the smoothness of \(\textrm{dist}\)-\(\textrm{SPHF}\), the value of each \({ph}_{S}^{k} (1 \le k \le N)\) is uniformly distributed from the view of \(\mathcal {A}\). Thus, according to the definition of \({sk}_{S}\) (\({sk}_{S}=\sum _{t=1}^{N}{{h}_{S,t}^{k}\oplus {ph}_{S,t}^{k}}\)) in Algorithm 2, this value is uniformly distributed.

Below, we try to bound the probability that \(\mathcal {A}\) can generate a new valid \({msg}_{1}\). To bound this probability more precisely, we assume that the password distribution obeys the CDF-Zipf law according to the study by Wang et al. [60]. Since \(\textrm{ZYF}\) scheme [48] is IND-CCA2 secure, all the valid \({msg}_{1}\)s that \(\mathcal {A}\) sees do not help her to construct a new valid \({msg}_{1}\).

Lemma 2

Assume that the password distribution obeys the CDF-Zipf law [60]. If \(\textrm{ZYF}\) scheme [48] is IND-CCA2 secure, then the probability that \(\mathcal {A}\) can generate a new valid \({msg}_{1}\) is at most \(C'\cdot {Q(\kappa )}^{s'}+\textrm{negl}(\kappa )\).

Proof. We first assume that the maximum probability that \(\mathcal {A}\) can generate a new valid \({msg}_{1}\) is \(C'\cdot {Q(\kappa )}^{s'}+{\textrm{poly}}^{-1}\). Then, we prove that \(\textrm{Sim}\) can use \(\mathcal {A}\) to break \(\textrm{ZYF}\) scheme [48] in this case. More specifically, we will show that how can \(\mathcal {A}\) generate a new valid encryption of a password pw after attacks of polynomial times on \(\textrm{ZYF}\) scheme [48].

  1. 1.

    \(\textrm{Sim}\) runs the adversary \(\mathcal {A}\). And if \(\mathcal {A}\) queries the \(\textrm{Execute}\) oracle (of \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\)), \(\textrm{Sim}\) will query the \(\textrm{Execute}\) oracle of \(\textrm{ZYF}\) scheme [48] twice and subsequently be returned two encryptions, denoted by \({{\textbf {C}}}_{1}\) and \({{\textbf {C}}}_{2}\), resepectively. Then, \(\textrm{Sim}\) can compute \({KP}_{U}\) and \({KP}_{S}\) according to \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) as well as return \(\mathcal {A}\) the transcript of this execution (i.e., \({msg}_{1}=(U, {{\textbf {C}}}_{1}, {KP}_{U})\), \({msg}_{2}=(S, {{\textbf {C}}}_{2}, {KP}_{S})\)).

  2. 2.

    \(\textrm{Sim}\) cooperates with other authentication servers (i.e., \({S}_{k} (1 \le k \le N-1)\)) to compute \({sk}_{S}\) according to the definition of the protocol.

  3. 3.

    \(\textrm{Sim}\) computes \({sk}_{U}\) and \({sk}_{S}\) for the user and servers in the honest case, respectively.

  4. 4.

    \(\textrm{Sim}\) records each \({msg}_{1}\) sent by \(\mathcal {A}\) (at most \(Q(\kappa )\)) and randomly chooses one to output.

If the upper bound of the probability that \(\mathcal {A}\) can generate a new valid \({msg}_{1}\) is \(C'\cdot {Q(\kappa )}^{s'}+{\textrm{poly}}^{-1}\), then after attacks of polynomial times by \(\mathcal {A}\), the probability that \(\textrm{Sim}\) can generate a new valid encryption of \(\textrm{ZYF}\) scheme [48] is \(C'\cdot {Q(\kappa )}^{s'}+{\textrm{poly}}^{-1}\). However, since \(\textrm{ZYF}\) scheme is IND-CCA2 secure, this probability of \(\textrm{Sim}\) is at most \(C'\cdot {Q(\kappa )}^{s'}+\textrm{negl}(\kappa )\).

In summary, Lemma 2 holds.

We now prove that the advantage of \(\mathcal {A}\) will not change if she sends a valid but not new \({msg}_{1}\) (i.e., a \({msg}_{1}\) generated by a previous oracle).

Lemma 3

If \({msg}_{1}\) is generated by a previous oracle and there is an instance \({\Pi }_{S}^{N,j}\) on the server side that is partnered with \({\Pi }_{U}^{i}\), then the advantage of \(\mathcal {A}\) remains unchanged.

This proof is straightforward. If \({msg}_{1}\) is generated by a previous oracle and there is an instance \({\Pi }_{S}^{N,j}\) on the server side that is partnered with \({\Pi }_{U}^{i}\), then there is a valid \({sk}_{S}^{N,j}\). In this case, \(\textrm{Sim}\) can directly set \({sk}_{S}={sk}_{S}^{N,j}\) and this just changes the way \({sk}_{S}\) is defined, but the view of \(\mathcal {A}\) remains the same. Thus if \(\mathcal {A}\) sends a valid but not new \({msg}_{1}\), her advantage will remain the same.

We are only left with the case where \(\mathcal {A}\) generates an invalid \({msg}_{1}\). We now prove that \(\mathcal {A}\) cannot distinguish whether \(\textrm{Sim}\) uses a valid password pw in this case. Let \(\textrm{Sim}\) simulate the user’s execution in an honest way (except \(\textrm{Sim}\) may use an invalid password \(pw'\)) and randomly choose a session key \({sk}_{S}\) for the server side. According to Lemma 1, this does not change the view of \(\mathcal {A}\). Below, we show that \(\textrm{Sim}\) can use \(\mathcal {A}\) to break \(\textrm{ZYF}\) scheme [48] if \(\mathcal {A}\) sends an invalid \({msg}_{1}\) and can distinguish between \(\textrm{view}(pw)\) and \(\textrm{view}(pw')\).

Given \({pk}_{\textrm{ZYF}}\) and \({{\textbf {G}}}_{b}\) as well as the ciphertext \({\textbf {C}}\) generated by the encryption oracle of \(\textrm{ZYF}\) scheme [48].

  1. 1.

    \(\textrm{Sim}\) runs \(\mathcal {A}\) and records each \({msg}_{1}\) sent by \(\mathcal {A}\).

  2. 2.

    Assume that \(\mathcal {A}\) breaks into the first \((N-1)\) authentication servers. \(\textrm{Sim}\) computes \({KP}_{S}^{N}\) according to \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) and constructs the output message \(({\textbf {C}}, {KP}_{S}^{N})\) of \({S}_{N}\).

In this case, if C is a new valid encryption  then \(\mathcal {A}\) sees \(\textrm{veiw}(pw)\); otherwise, \(\mathcal {A}\) sees \(\textrm{view}(pw')\). Therefore, if \(\mathcal {A}\) can distinguish between \(\textrm{veiw}(pw)\) and \(\textrm{view}(pw')\), then \(\textrm{Sim}\) can distinguish between pw and \(pw'\). However, since \(\textrm{ZYF}\) scheme is IND-CCA2 secure, \(\mathcal {A}\) cannot distinguish whether \(\textrm{Sim}\) uses a valid password pw.

In summary, Theorem 3 holds and \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is transparently secure.

Appendix D: Correctness and security proofs for \(\mathrm {{\textbf {nt}}}\)-\(\mathrm {{\textbf {Multi}}}\)-\(\mathrm {{\textbf {PAKE}}}\)

Correctness proof. For the value of the session key, \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is consistent with \(\textrm{t}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\). Therefore, \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is also correct according to the correctness proof in Appendix C.

Security proof. We now prove that \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) in Algorithm 3 will be non-transparently secure if \(\textrm{ePAKE}\) derived from the framework of Li and Wang [2] is secure. We prove this by contradiction below. We still assume that the password distribution obeys the CDF-Zipf law [60] for bounding the adversary’s advantage more precisely. Let \(\mathcal {B}\) and \(\mathcal {A}\) be the PPT adversaries attacking \(\textrm{ePAKE}\) and \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), respectively. Assume that \(\mathcal {A}\) corrupt the first (\(N-1\)) servers without loss of generality, we show that \(\mathcal {B}\) is able to simulate \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) for \(\mathcal {A}\) with an invalid password \(pw'\) and the probability that \(\mathcal {A}\) can distinguish \(\textrm{view}(pw)\) from \(\textrm{view}(pw')\) is at most \((C'\cdot {Q(\kappa )}^{s'}+\textrm{negl}(\kappa ))\).

Every time \(\mathcal {A}\) wants to see the execution of \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) (by querying the \(\textrm{Execute}\) or \(\textrm{Send}\) oracle), \(\mathcal {B}\) queries the corresponding oracle of \(\textrm{ePAKE} N\) times and subsequently uses what is returned to respond \(\mathcal {A}\).

(1) Execute oracle

If \(\mathcal {A}\) queries the \(\textrm{Execute}\) oracle of \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), \(\mathcal {B}\) will query this type of oracle of \(\textrm{ePAKE} N\) times and sends the N authentication servers message \({({msg}_{1}^{k}, {msg}_{2}^{k})}_{k=1}^{N}\).

The protocol that \(\mathcal {B}\) simulates for \(\mathcal {A}\) should satisfy that when the simulated protocol is executed in an honest way, the output message exactly the same as \({\{({msg}_{1}^{k}, {msg}_{2}^{k})\}}_{k=1}^{N}\) of a real-world protocol execution. Besides, since \(\mathcal {A}\) controls the user, we do not consider \({\{{msg}_{1}^{k}\}}_{k=1}^{N}\) generated by the user.

We now show that \(\mathcal {B}\) can simulate the whole \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) for \(\mathcal {A}\) with an invalid password \(pw'\) such that the output is exactly \({\{{msg}_{2}^{k}\}}_{k=1}^{N}\).

  1. 1.

    \(\textrm{Sim}\) simulates the message of the user U with \({\{{msg}_{1}^{k}\}}_{k=1}^{N}\).

  2. 2.

    \(\textrm{Sim}\) computes the hash key \({\{{KH}_{U}^{k}\}}_{k=1}^{N}\) and the projection key \({\{{KP}_{U}^{k}\}}_{k=1}^{N}\) for the user according to \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\).

  3. 3.

    For \(k \in [1, N]\), according to the \((N-1)\) messages \(({S}_{t}, {{\textbf {C}}}_{S,N}^{t}, {KP}_{S,N}^{t})~ (1 \le t \le (N-1))\) of the first \((N-1)\) authentication servers and the known \({\{{msg}_{2}^{k}\}}_{k=1}^{N}\), \(\textrm{Sim}\) computes

    $$\begin{aligned} \left\{ \begin{array}{ll} &{}{{\textbf {C}}}_{S,k}^{N}={{\textbf {C}}}_{S}^{k}-\sum \nolimits _{t=1}^{N-1}{{{\textbf {C}}}_{S,k}^{t}}\\ &{}{KP}_{S,k}^{N}={KP}_{S,k}-\sum \nolimits _{t=1}^{N-1}{{KP}_{S,k}^{t}}\\ \end{array}\right. \end{aligned}$$
    (20)

(2) Send oracle

For convenience of description, \(\textrm{Send}\) oracle is divided into \(\textrm{Send0}\) and \(\textrm{Send1}\). \(\textrm{Send0}\) initiates an execution of the protocol and returns \({msg}_{1}\) to \(\mathcal {A}\). \(\textrm{Send1}\) models U sending \(\textrm{msg}_{1}\) to the server side. \(\textrm{Send1}\) returns no message to \(\mathcal {A}\), but it computes the session key in an honest way.

If \(\mathcal {A}\) queries \({\textrm{Send0}}_{\mathcal {A}}\), \(\mathcal {B}\) will query \({\textrm{Send0}}_{\mathcal {B}}\) of \(\textrm{ePAKE} N\) times. Then, \(\mathcal {B}\) uses the received \({\{{msg}_{1}^{k}\}}_{k=1}^{N}\) to construct \({msg}_{1}\) and returns it to \(\mathcal {A}\).

If \(\mathcal {A}\) queries \({\textrm{Send1}}_{\mathcal {A}}\), \(\mathcal {B}\) returns no message to \(\mathcal {A}\), but \(\mathcal {B}\) queries \({\textrm{Send1}}_{\mathcal {B}}\) of \(\textrm{ePAKE} N\) times and computes the session key as follows. ➀ If \({{\textbf {C}}}_{S,k}\) is invalid and generated by \(\mathcal {A}\), set the session key of \({S}_{k}\) to be random. ➁ If \({{\textbf {C}}}_{S,k}\) is valid and generated by \(\mathcal {A}\), then let \(\mathcal {A}\) succeed directly. ➂ If \({{\textbf {C}}}_{S,k}\) is generated by a previous oracle and there exists an instance \({\Pi }_{U}^{k,i}\) on the user side that is partnered with instance \({\Pi }_{S}^{k,{j}_{k}}\), then let \({sk}_{s}^{k,{j}_{k}}={sk}_{U}^{k,i}\). According to the smoothness of \(\textrm{dist}\)-\(\textrm{SPHF}\), the change in the advantage of \(\mathcal {A}\) brought by case ➀ is negligible. The change in case ➂ is only conceptual and will not change the advantage of \(\mathcal {A}\). Finally, since we assume that the password distribution obeys the CDF-Zipf law [60], the probability that case ➁ occurs is at most \(C'\cdot {Q(\kappa )}^{s'}+\textrm{negl}(\kappa )\).

(3) Reveal oracle

If \(\mathcal {A}\) query the \(\textrm{Reveal}\) oracle of \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), \(\mathcal {B}\) will query the Reveal oracle of \(\textrm{ePAKE}\).

(4) \(\textrm{Test}\) oracle

If \(\mathcal {A}\) queries the \(\textrm{Test}\) oracle, then \(\mathcal {B}\) queries the \(\textrm{Test}\) oracle of \(\textrm{ePAKE}\) and returns the received random string to \(\mathcal {A}\). Finally, \(\mathcal {B}\) outputs what \(\mathcal {A}\) outputs.

It is clearly that the advantage of \(\mathcal {A}\) is equal to the advantage of \(\mathcal {B}\), and this maximum value is \((C'\cdot {Q(\kappa )}^{s'}+\textrm{negl}(\kappa ))\). Thus, if \(\mathcal {A}\) can break \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\), then \(\mathcal {B}\) can break \(\textrm{ePAKE}\). In summary, \(\textrm{nt}\)-\(\textrm{Multi}\)-\(\textrm{PAKE}\) is non-transparently secure.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, L., Qu, T. & Yin, A. Quantum-safe multi-server password-based authenticated key exchange protocol. Multimed Tools Appl 83, 65011–65038 (2024). https://doi.org/10.1007/s11042-023-17984-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17984-1

Keywords