Anonymous Password-Based Authenticated Key Exchange

  • Duong Quang Viet
  • Akihiro Yamamura
  • Hidema Tanaka
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3797)

Abstract

We propose and discuss an anonymous password-based authenticated key exchange scheme that allows a user in a group to establish a session key with a server in an anonymous way. In our scheme, each user in a legitimate group and the server share a human-memorable password, and they can authenticate each other. The scheme is secure against the dictionary attack. Furthermore, we extend this to the scheme that allows any subgroup of at least k-out-of-n users of the group to establish a session key with the server in an anonymous way.

Keywords

Password-based authenticated key exchange Anonymous group authentication Oblivious transfer 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191–208. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Bellovin, S.M., Merritt, M.: ‘‘Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks”. In: Proc. of the Symposium on Security and Privacy, pp. 72–84. IEEE, Los Alamitos (1992)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: STOC 1998, pp. 419–428 (1998)Google Scholar
  5. 5.
    Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145–158. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Franklin, M.: Anonymous authentication with subset queries. In: ACM CCS 1999, pp. 113–119 (1999)Google Scholar
  7. 7.
    Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. Springer, Heidelberg (2003)Google Scholar
  8. 8.
    Boyko, V., MacKenzie, P., Patel, S.: Provable secure password-authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Chu, C.K., Tzeng, W.G.: Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172–183. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    De Santis, A., Di Crescenzo, G., Persiano, G.: Communication-efficient anonymous group identification. In: ACM CCS 1998, pp. 73–82 (1998)Google Scholar
  11. 11.
    Diffie, W., van Oorschot, P.C., Wiener, M.J.: New Authentication and Authenticated Key Exchanges. Designs, Cosdes and Cryptography 2(2), 107–125 (1992)CrossRefGoogle Scholar
  12. 12.
    Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524–543. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475–494. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Lee, C.H., Deng, X., Zhu, H.: Design and Security Analysis of Anonymous Group Identification Protocols. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 188–198. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Tzeng, W.G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 159–171. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Duong Quang Viet
    • 1
  • Akihiro Yamamura
    • 1
  • Hidema Tanaka
    • 1
  1. 1.Department of Information and Networks SystemsNational Institute of Information and Communications TechnologyTokyoJapan

Personalised recommendations