Presentation 2007-07-19
On Anonymous Password-Authenticated Key Exchange
SeongHan SHIN, Kazukuni KOBARA, Hideki IMAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) An anonymous password-authenticated key exchange (PAKE) protocol is designed to provide both user's password-based authentication and anonymity against a semi-honest server. However, the computation and communication costs of the previous construction grow linearly with the number of users. In this paper, we propose two efficient anonymous PAKE (called, MEAP and VEAP) protocols which provide unconditional anonymity of the involved user. If the pre-computation is allowed, the overall computation cost of the MEAP protocol is independent of the number of users. We also show how the VEAP protocol works where the overall computation and communication costs are completely independent of the number of users. In the VEAP protocol, user (resp., server) needs only 2 (resp., 3) on-line modular exponentiations. The security of both protocols is based on the CT-CDH (Chosen Target CDH) problem in the random oracle model.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) authenticated key exchange / passwords / on-line and off-line dictionary attacks / anonymity
Paper # ISEC2007-37,SITE2007-31
Date of Issue

Conference Information
Committee SITE
Conference Date 2007/7/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) On Anonymous Password-Authenticated Key Exchange
Sub Title (in English)
Keyword(1) authenticated key exchange
Keyword(2) passwords
Keyword(3) on-line and off-line dictionary attacks
Keyword(4) anonymity
1st Author's Name SeongHan SHIN
1st Author's Affiliation Research Center for Information Security, AIST()
2nd Author's Name Kazukuni KOBARA
2nd Author's Affiliation Research Center for Information Security, AIST
3rd Author's Name Hideki IMAI
3rd Author's Affiliation Research Center for Information Security, AIST:Chuo University
Date 2007-07-19
Paper # ISEC2007-37,SITE2007-31
Volume (vol) vol.107
Number (no) 139
Page pp.pp.-
#Pages 7
Date of Issue