ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Cited 4 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song
Issue Date
2015-12
Citation
International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-319-27152-1_3
Abstract
In the paper we propose new authenticated key exchange (AKE) protocols from a combination of identity-based signature (IBS) and a password-based authentication. The proposed protocols allows for a client to execute a convenient authentication by using only a humanmemorable password and a server's identity. The use of an IBS gives security enhancements against threats from password leakage. A server authentication method is based on an IBS, which is independent of a password shared with a client. Even if a password is revealed on the side of a client protected poorly, server impersonation can be prevented effectively. In addition, our protocols have resilience to server compromise by using ?쁯assword verification data??, not a true password at the server. An adversary cannot use the data revealed from server compromise directly to impersonate a client without additional off-line dictionary attacks. We emphasize that most of existing password-based AKE protocols are vulnerable to subsequent attacks after password leakage. Our first hybrid AKE protocol is constructed using concrete parameters from discrete logarithm based groups. It is designed to give resilience to server compromise. Our second protocol is a simplified version of the first protocol where the computation cost of a client is cheap. Generalizing the basic protocols, we present a modular method to convert Diffie-Hellman key exchange into an AKE protocol based on a password and an IBS. Finally, we give performance analysis for our protocols and comparison among known hybrid AKE protocols and ours. As shown later in the paper, our protocols provide better performance. Our experimental results show that the proposed protocols run in at most 20 ms. They can be widely applied for information security applications.
KSP Keywords
Authenticated key exchange, Authentication method, Basic Protocol, Computation cost, Concrete parameters, Dictionary attack, Diffie-Hellman key exchange, Discrete logarithm(DL), Identity-based signature, Off-line, Password leakage