Presentation | 2006-07-21 An Efficient Anonymous Password-Authenticated Key Exchange Protocol SeongHan SHIN, Kazukuni KOBARA, Hideki IMAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, Viet et al., [21] have proposed an anonymous password-authenticated key exchange (PAKE) protocol against a passive server, who follows the protocol honestly but it is curious about identity of client. In this paper, we propose an efficient construction for anonymous PAKE protocol (we call it the EAR protocol) which provides semantic security of session keys in the random oracle model, with the reduction to the computational Diffie-Hellman problem, as well as anonymity against a passive server. Specially, the EAR protocol has about 50% reduction (compared to [21]) in the number of modular exponentiations for both client and server, and its communication bandwidth for the modular size of prime p is independent from the number of clients while [21] is not. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | authenticated key exchange / passwords / on-line and off-line dictionary attacks / anonymity |
Paper # | ISEC2006-54 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2006/7/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An Efficient Anonymous Password-Authenticated Key Exchange Protocol |
Sub Title (in English) | |
Keyword(1) | authenticated key exchange |
Keyword(2) | passwords |
Keyword(3) | on-line and off-line dictionary attacks |
Keyword(4) | anonymity |
1st Author's Name | SeongHan SHIN |
1st Author's Affiliation | Research Center for Information Security, AIST() |
2nd Author's Name | Kazukuni KOBARA |
2nd Author's Affiliation | Research Center for Information Security, AIST |
3rd Author's Name | Hideki IMAI |
3rd Author's Affiliation | Research Center for Information Security, AIST:Chuo University |
Date | 2006-07-21 |
Paper # | ISEC2006-54 |
Volume (vol) | vol.106 |
Number (no) | 176 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |