4.6 Article

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.3040776

关键词

Post quantum security; password authentication; asymmetric password authenticated key exchange; smooth projective hash function; password hashing scheme; lattice-based cryptography

资金

  1. National Natural Science Foundation of China [61802006, 61802214]
  2. National Natural Science Foundation of Shandong province, China [ZR2019BF009]
  3. applied basic research project of Qingdao [19-6-2-6-cg]
  4. Foundation of Guizhou Provincial Key Laboratory of Public Big Data [2019BDKFJJ007]

向作者/读者索取更多资源

Password authentication is a dominant form of access control for the Web and mobile devices, and the use of Password Authenticated Key Exchange (PAKE) systems is recommended for secure data communication. The industry standard suggests using asymmetric-PAKE protocols to prevent password exposure.
Password authentication is the dominant form of access control for the Web and mobile devices, and its practicality and ubiquity is unlikely to be replaced by other authentication approaches in the foreseeable future. To guarantee the security of data communication and mitigate the problem of password-cracking, a Password Authenticated Key Exchange (PAKE ) system can be deployed between two peer participants. The main drawback of traditional PAKE is that passwords are exposed in plaintext when the remote server is compromised. To overcome this limitation, it is recommended by industry standards (such as SRP family RFC 5054, RFC6628, RFC7914, OPAQUE, etc ) to use asymmetric-PAKE protocols, which enable the server to store a hash of the user's password with a random salt, providing guarantees that the user's password is never transmitted in plain-text to the server when login. However, most of the existing asymmetric-PAKE protocols either are based on traditional hash functions under random oracles, or depend on non-quantum-secure hardness assumptions and become insecure in the quantum era. To bridge the gap between asymmetric-PAKE and quantum-security, in this article, we resort to smooth projective hash functions (SPHF ) and commitment-based password-hashing schemes (PHS ) over lattice-based cryptography, and construct an asymmetric PAKE protocol secure against quantum attacks. Our construction eliminates the costly non-interactive zero-knowledge (NIZK) method, bypasses assumptions of the random oracle model, and achieves quantum resistance. We also show that our asymmetric- PAKE protocol can achieve security and efficiency under the Bellare-Pointcheval-Rogaway (BPR) model. Finally, we develop a prototype implementation of our instantiation and use it to evaluate its performance in realistic settings.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据