Anonymous Password-Based Authenticated Key Exchange

  • Duong Quang Viet
  • Akihiro Yamamura
  • Hidema Tanaka
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3797)


We propose and discuss an anonymous password-based authenticated key exchange scheme that allows a user in a group to establish a session key with a server in an anonymous way. In our scheme, each user in a legitimate group and the server share a human-memorable password, and they can authenticate each other. The scheme is secure against the dictionary attack. Furthermore, we extend this to the scheme that allows any subgroup of at least k-out-of-n users of the group to establish a session key with the server in an anonymous way.


Password-based authenticated key exchange Anonymous group authentication Oblivious transfer 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191–208. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Bellovin, S.M., Merritt, M.: ‘‘Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks”. In: Proc. of the Symposium on Security and Privacy, pp. 72–84. IEEE, Los Alamitos (1992)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: STOC 1998, pp. 419–428 (1998)Google Scholar
  5. 5.
    Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145–158. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Franklin, M.: Anonymous authentication with subset queries. In: ACM CCS 1999, pp. 113–119 (1999)Google Scholar
  7. 7.
    Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. Springer, Heidelberg (2003)Google Scholar
  8. 8.
    Boyko, V., MacKenzie, P., Patel, S.: Provable secure password-authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Chu, C.K., Tzeng, W.G.: Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172–183. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    De Santis, A., Di Crescenzo, G., Persiano, G.: Communication-efficient anonymous group identification. In: ACM CCS 1998, pp. 73–82 (1998)Google Scholar
  11. 11.
    Diffie, W., van Oorschot, P.C., Wiener, M.J.: New Authentication and Authenticated Key Exchanges. Designs, Cosdes and Cryptography 2(2), 107–125 (1992)CrossRefGoogle Scholar
  12. 12.
    Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524–543. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475–494. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Lee, C.H., Deng, X., Zhu, H.: Design and Security Analysis of Anonymous Group Identification Protocols. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 188–198. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Tzeng, W.G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 159–171. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Duong Quang Viet
    • 1
  • Akihiro Yamamura
    • 1
  • Hidema Tanaka
    • 1
  1. 1.Department of Information and Networks SystemsNational Institute of Information and Communications TechnologyTokyoJapan

Personalised recommendations