ETRI-Knowledge Sharing Plaform



논문 검색
구분 SCI
연도 ~ 키워드


학술대회 Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Cited 3 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
황정연, 김승현, 최대선, 진승헌, 송보연
International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69
15MS5900, 상황인지기반 멀티팩터 인증 및 전자서명을 제공하는 범용인증플랫폼기술 개발, 김수형
In the paper we propose new authenticated key exchange (AKE) protocols from a combination of identity-based signature (IBS) and a password-based authentication. The proposed protocols allows for a client to execute a convenient authentication by using only a humanmemorable password and a server's identity. The use of an IBS gives security enhancements against threats from password leakage. A server authentication method is based on an IBS, which is independent of a password shared with a client. Even if a password is revealed on the side of a client protected poorly, server impersonation can be prevented effectively. In addition, our protocols have resilience to server compromise by using ?쁯assword verification data??, not a true password at the server. An adversary cannot use the data revealed from server compromise directly to impersonate a client without additional off-line dictionary attacks. We emphasize that most of existing password-based AKE protocols are vulnerable to subsequent attacks after password leakage. Our first hybrid AKE protocol is constructed using concrete parameters from discrete logarithm based groups. It is designed to give resilience to server compromise. Our second protocol is a simplified version of the first protocol where the computation cost of a client is cheap. Generalizing the basic protocols, we present a modular method to convert Diffie-Hellman key exchange into an AKE protocol based on a password and an IBS. Finally, we give performance analysis for our protocols and comparison among known hybrid AKE protocols and ours. As shown later in the paper, our protocols provide better performance. Our experimental results show that the proposed protocols run in at most 20 ms. They can be widely applied for information security applications.
Authentication, Identity-based signature, Key exchange, Password
KSP 제안 키워드
Authenticated key exchange, Authentication method, Basic Protocol, Computation cost, Concrete parameters, Dictionary attack, Diffie-Hellman key exchange, Discrete logarithm(DL), Off-line, Password leakage, Performance analysis