Presentation 2006-07-21
An Efficient Anonymous Password-Authenticated Key Exchange Protocol
SeongHan SHIN, Kazukuni KOBARA, Hideki IMAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, Viet et al., [21] have proposed an anonymous password-authenticated key exchange (PAKE) protocol against a passive server, who follows the protocol honestly but it is curious about identity of client. In this paper, we propose an efficient construction for anonymous PAKE protocol (we call it the EAR protocol) which provides semantic security of session keys in the random oracle model, with the reduction to the computational Diffie-Hellman problem, as well as anonymity against a passive server. Specially, the EAR protocol has about 50% reduction (compared to [21]) in the number of modular exponentiations for both client and server, and its communication bandwidth for the modular size of prime p is independent from the number of clients while [21] is not.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) authenticated key exchange / passwords / on-line and off-line dictionary attacks / anonymity
Paper # ISEC2006-54
Date of Issue

Conference Information
Committee ISEC
Conference Date 2006/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) An Efficient Anonymous Password-Authenticated Key Exchange Protocol
Sub Title (in English)
Keyword(1) authenticated key exchange
Keyword(2) passwords
Keyword(3) on-line and off-line dictionary attacks
Keyword(4) anonymity
1st Author's Name SeongHan SHIN
1st Author's Affiliation Research Center for Information Security, AIST()
2nd Author's Name Kazukuni KOBARA
2nd Author's Affiliation Research Center for Information Security, AIST
3rd Author's Name Hideki IMAI
3rd Author's Affiliation Research Center for Information Security, AIST:Chuo University
Date 2006-07-21
Paper # ISEC2006-54
Volume (vol) vol.106
Number (no) 176
Page pp.pp.-
#Pages 8
Date of Issue