Browse > Article

Method to Obtain Asymmetric Authenticated Key Exchange Protocols from Symmetric Ones  

양대헌 (인하대학교 정보통신대학원)
Abstract
Password authenticated key exchange protocols for the symmetric model are easier to design, analyze and are more efficient than ones for the asymmetric model, but they are most likely to be broken by server's compromise. Though the protocols with provable security for the asymmetric model such as PAK-X and SNAPI-X are introduced, they need large amount of computation compared with the standard Diffie-Hellman key exchange. We present a systematic and efficient way to transform password authenticated key exchange protocols for the symmetric model into protocols for the asymmetric model. Thus, an efficient protocol for the asymmetric model can be constructed by a systematic protocol with low computation.
Keywords
Authenticated Key Exchange; Password; ZKIP; Asymmetric Model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Wu, 'Secure Remote Password Protocol,' Internet Society Symp. Network ad Distributed System Security, 1998
2 V. Boyko, P. Mackenzie and S. Patel, 'Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 156-171
3 P. MacKenzie, S. Patel and R. Swaminathan, 'Password-Authenticated Key Exchange Based on RSA,' Proceedings of Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 599-613
4 J. Katz, R. Ostrovsky and M. Yung, 'Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords,' Proceedings of Euro-crypt 2001, Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 475-494
5 L.C. Guillou and J.J. Quisquater, 'Protocol fitted to security microprocessor minimizing both transmission and memory,' Proceedings of EuroCrypt 88, Lecture Notes in Computer Science, Springer-Verlag, 1988, pp. 123-128   DOI
6 U. Feige, A. Fiat and A. Shamir, 'Zero-knowledge proofs of indentity,' Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 77-94   DOI
7 C.P. Schnorr, Efficient Identification and Signatures for Smart cards, Advances in Cryptology : Proceedings of Crypt 89, Lecture Notes in Computer Science, Springer-Verlag, New York, 1989, pp. 239-251
8 S. Bellovin and M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' IEEE Comp. Society Symp. on Research in Security and Privacy, 1992, pp. 7284   DOI
9 M. Bellare, D. Pointcheval and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 139-155
10 D. Jablon, 'Strong password-only authenticated key exchange,' ACM Comp. Comm. Review, 1996, Vol. 26, No. 5, pp. 526   DOI
11 D. Jablon, 'Extended Password Key Exchange Protocols Immune to Dictionary Attacks,' Proc. of WET-ICE '97, IEEE Computer society, June, 1997, Cambridge, MA, pp. 248-255   DOI
12 S. Bellovin and M. Merrit, 'Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and passwrod file compromise,' ACM Conference on Comp. and Comm. Security, 1993, pp. 244-250   DOI