首页> 外文会议>Annual International Cryptology Conference; 20060820-24; Santa Barbara,CA(US) >A Method for Making Password-Based Key Exchange Resilient to Server Compromise
【24h】

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

机译:一种使基于密码的密钥交换能够抵御服务器威胁的方法

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is desirable to maintain some degree of security even if the server is compromised. A PAKE scheme is said to be resilient to server compromise if an adversary who compromises the server must at least perform an offline dictionary attack to gain any advantage in impersonating a client. (Of course, offline dictionary attacks should be infeasible in the absence of server compromise.) One can see that this is the best security possible, since by definition the password file has enough information to allow one to play the role of the server, and thus to verify passwords in an offline dictionary attack. While some previous PAKE schemes have been proven resilient to server compromise, there was no known general technique to take an arbitrary PAKE scheme and make it provably resilient to server compromise. This paper presents a practical technique for doing so which requires essentially one extra round of communication and one signature computation/ verification. We prove security in the universal composability framework by (1) defining a new functionality for PAKE with resilience to server compromise, (2) specifying a protocol combining this technique with a (basic) PAKE functionality, and (3) proving (in the random oracle model) that this protocol securely realizes the new functionality.
机译:本文考虑了客户端-服务器设置中的密码认证密钥交换(PAKE)问题,其中服务器使用存储的密码文件进行认证,即使服务器受到威胁,也希望保持一定程度的安全性。如果破坏服务器的对手必须至少执行脱机字典攻击以获取模仿客户端的任何优势,则PAKE方案可以抵抗服务器的破坏。 (当然,在不影响服务器的情况下,离线字典攻击应该是不可行的。)可以看到,这是最好的安全性,因为根据定义,密码文件具有足够的信息,可以让人们扮演服务器的角色,并且从而在离线字典攻击中验证密码。尽管已证明某些先前的PAKE方案可以抵抗服务器损害,但尚无已知的通用技术采用任意PAKE方案并使其具有可证明的服务器损害防御能力。本文介绍了一种实用的技术,它实际上需要进行额外的一轮通信和一个签名计算/验证。我们通过(1)定义PAKE的新功能并具有抵御服务器漏洞的能力来证明通用可组合性框架中的安全性;(2)指定结合了该技术和(基本)PAKE功能的协议;以及(3)证明(以随机方式oracle模型),该协议可以安全地实现新功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号