Title: Research on Password-Authenticated Group Key Exchange
1Research on Password-Authenticated Group Key
Exchange
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
(CIST, Korea Univ.) Kouchi Sakurai
(Kyushu Univ.) March 5, 2006
2Motivation
- A fundamental problem in cryptography is how to
communicate securely over an insecure channel.
3Motivation
- How can we obtain a secret session key?
- Public-key encryption or signature
- too high for certain applications
- Password-Authenticated Key Exchange (PAKE)
- PAKE allows to share a secret key between
specified parties using just a human-memorable
password. - convenience, mobility, and less hardware
requirement - no security infrastructure
4Classification of PAKE
5Our research topic on PAKE
- Password-Authenticated Group Key Exchange
(PAGKE) -
6PAGKE Setting
- A broadcast group consisting of a set of users
- each user holds a low-entropy secret (pw)
Group with sk
7Previous Works
- Efficient Password-Based Group Key Exchange
(Trust-Bus 04) - S. M. Lee, J. Y. Hwang, and D.
H. Lee. - a provably secure constant-round PAGKE protocol
- forward-secure and secure against known-key
attacks - ideal-cipher and ideal-hash assumptions
- Password-based Group Key Exchange in a Constant
Number of Rounds (PKC 06) - Abdalla, E.
Bresson, O. Chevassut, and D. Pointcheval. - a provably secure constant-round PAGKE protocol
- secure against known-key attacks
- ideal-cipher and ideal-hash assumptions
8Our Goal
- The focus of this work is to provide a
provably-secure constant-round PAGKE protocol
without using the random oracle model.
9Preliminary for protocol
- Public information
- G a finite cyclic group has order q
- p a safe prime such that p2q1
- g1,g2 generators of G
- H a one-way hash function
- F a pseudo random function family
10Burmester and Desmedts Protocol
U1
U2
U3
U4
R1
R2
M. Burmester and Y. Desmedt. A Secure and
Efficient Conference Key Distribution System, In
Proc. of EUROCRYPT 94.
11Protocol
U1
U2
U3
U4
R1
R2
12Security Measurement
- Security theorem
-
- where t is the maximum total game time
including an adversarys running time, and an
adversary makes qex execute-queries, qse
send-queries. n is the upper bound of the number
of the parties in the game, Ns is the upper bound
of the number of sessions that an adversary
makes, PW is the size of a password space. - Under the intractability assumption of the DDH
problem and if F is a secure pseudo random
function family, the proposed protocol is secure
against dictionary attacks and known-key attacks,
and provides forward secrecy.
13Jeong Ok Kwon (pitapat_at_korea.ac.kr)