Presentation 2006-07-21
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok KWON, Kouichi SAKURAI, Dong Hoon LEE,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Multi-party password-authenticated key exchange (PAKE) with different passwords allows the users of a group to agree on a common session key with their different passwords by the help of a server. In this setting, a user shares a password only with the server, but not between the users. In this paper, we present two multi-party PAKE protocols. The suggested protocols are provably-secure in the standard model. Our first protocol is designed to provide forward secrecy and security against known-key attacks. The second protocol is designed to additionally provide key secrecy against the server which means that even the server can not know the session keys of the users of a group. The suggested protocols require a constant number of rounds.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Password-authenticated key exchange / key exchange with different passwords / key secrecy against the server
Paper # ISEC2006-55
Date of Issue

Conference Information
Committee ISEC
Conference Date 2006/7/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Sub Title (in English)
Keyword(1) Password-authenticated key exchange
Keyword(2) key exchange with different passwords
Keyword(3) key secrecy against the server
1st Author's Name Jeong Ok KWON
1st Author's Affiliation Graduate School of Information Security CIST, Korea university:Department of Computer Science and Communication Engineering, Kyushu University()
2nd Author's Name Kouichi SAKURAI
2nd Author's Affiliation Department of Computer Science and Communication Engineering, Kyushu University
3rd Author's Name Dong Hoon LEE
3rd Author's Affiliation Graduate School of Information Security CIST, Korea university
Date 2006-07-21
Paper # ISEC2006-55
Volume (vol) vol.106
Number (no) 176
Page pp.pp.-
#Pages 8
Date of Issue