Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.6.113

Efficiency in the Password-based Authenticated Key Exchange  

황정연 (고려대학교 정보보호 기술센터)
홍석희 (고려대학교 정보보호 기술센터)
박혜영 (고려대학교 정보보호 기술센터)
장상운 (고려대학교 정보보호 기술센터)
박영호 (세종 사이버 대학교)
류희수 (한국전자통신연구원)
Abstract
Proposals for a password-based authenticated key exchange protocol that have been published so far almost concentrated on the provable security. But in a real environment such as mobile one, efficiency is a critical issue as security. In this paper we discuss the efficiency of PAK which is secure in the random oracle model [l]. Among 4 hash functions in PAK the instantiation for $H_1$, which outputs a verifier of the password, has most important effect on the computational efficiency. We analyze two different methods for $H_1$ suggested in [1] and we show that $H_{lq}$ has merits in transforming to EC or XTR variants as well as in the efficiency. As an efficient variant. we propose PAK2-EC and PAK2-XTR which do not require any additional step converting a hash output into a point of elliptic curve or XTR subgroup when compared to the previous work on the PAK[2]. Finally we compare PAK2 with the password-based authenticated key exchange protocols such as SPEKE, SRP, and AMP.
Keywords
Password-based authenticated key exchange;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Extended Password Key Exchange Protocols Immune to Dictionary Attacks /
[ D. Jablon ] / Proceedings of the Sixth Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WET-ICE '97) IEEE Computer Society
2 The XTR public key system /
[ A. Lenstra;E. Verheul ] / Advances in Cryptology Crypto'00, Lecture Notes in Computer Science   DOI
3 Use of elliptic curves in cryptography /
[ V. Miller ] / Advances in Cryptology Crypto'85, Lecture Notes in Computer Science   DOI
4 Elliptic Curves in Cryptography /
[ I. F. Blake;G. Seroussi;N. P. Smart ] / LMS Lecture Note Series 265
5 The Secure Remote Password Protocol /
[ T. Wu ] / Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium
6 Strong Password-Only Authenticated Key Exchange /
[ D. Jablon ] / Computer Communication Review,   DOI   ScienceOn
7 Provably secure password-authenticated key exchange using Diffie-Hellman /
[ V. Boyko;P. MacKenzie;S. Patal ] / Advances in Cryptology Eurocrypt'00, Lecture Notes in Computer Science
8 /
[ P. MacKenzie ] / The PAK suites : Protocols for Password-Authenticated Key Exchange
9 A Practical Public Key Cryptosystem Provably Secure Against Chosen Ciphertext Attack /
[ R. Cramer;V. Shoup ] / Advances in Cryptology Crypto'98, Lecture Notes in Computer Science   DOI
10 Efficient password-authenticated key exchange using human-memorable passwords /
[ J. Katz;R. Ostrovsky;M. Yung ] / Advances in Cryptology Eurocrypt'01, Lecture Notes in Computer Science
11 Faster Point Multiplication in Cryptology /
[ R. P. Gallant;J. L. Lambert;S. A. Vanstone ] / Advances in Cryptology Crypto'01, Lecture Notes in Computer Science   DOI
12 More Efficient Password-Authenticated Key Exchange /
[ P. MacKenzie ] / RSA Conference, Cryptographer's Track
13 Password-authenticated key exchange based on RSA /
[ P. MacKenzie;S. Patal;R. Swaminathan ] / Advances in Cryptology Asiacrypt'00, Lecture Notes in Computer Science   DOI
14 Encrypted key exchange: Password-based protocols secure against dictionary attacks /
[ S. Bellovin;M. Merritt ] / Proceedings of the Symposium on Security and Privacy
15 Elliptic curve cryptosystems /
[ N. Koblitz ] / Math. Comp.   DOI   ScienceOn
16 The art of computer programming /
[ D.E. Knuth ] / Seminumerical Algorithms(second edition)
17 Authenticated key exchange secure against dictionary attacks /
[ M. Bellare;D. Pointcheaval;P. Rogaway ] / Advances in Cryptology Eurocrypt'00, Lecture Notes in Computer Science
18 Key improvements to XTR /
[ A. Lenstra;E. Verheul ] / Advances in Cryptology Asiacrypt'00, Lecture Notes in Computer Science   DOI
19 Session-key generation using human passwords only /
[ O. Goldreich;Y. Lindell;J. Killian(ed.) ] / Advances in Cryptology Crypto'01, Lecture Notes in Computer Science   DOI
20 On-Line/Off-Line Digital Signatures /
[ S. Even;O. Goldreich;S. Micali ] / Advances in Cryptology Crypto'00, Lecture Notes in Computer Science
21 How to Play Any Mental Geme, or a Completeness Theorem for protocols with an Honest Majority /
[ O. Goldreich;S. Micali;A. Wigderson ] / STOC'87
22 /
[ T. Kwon ] / submission to P1363
23 Key improvements to XTR /
[ A. Lenstra;E. Verheul ] / Advances in Cryptology Asiacrypt'00, Lecture Notes in Computer Science   DOI