Presentation 2010-07-02
Efficient Augmented PAK Protocols
SeongHan SHIN, Kazukuni KOBARA, Hideki IMAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Password-authenticated key exchange (PAKE) is the problem about how to share a strong secret securely in the presence of an adversary between the parties, who share a weak secret only. In the literature, there has been a significant amount of works on augmented PAKE protocols that provide extra protection for server compromise. An augmented PAKE protocol is said to be resistant to server compromise if an adversary who obtained password verification data from a server cannot impersonate a client without performing off-line dictionary attacks on the password verification data. In this paper, we propose efficient augmented PAK (called, AugmentedPAK1 and AugmentedPAK2) protocols that are secure against server-compromise impersonation attacks, and are more efficient than the previous ones. Interestingly, the computational efficiency of the AugmentedPAK1 and AugmentedPAK2 protocols are almost same as the balanced PAK protocol that does not provide resistance to server compromise at all.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) PAKE / augmented PAKE / on-line/off-line dictionary attacks / server compromise / efficiency
Paper # ISEC2010-32,SITE2010-28,ICSS2010-38
Date of Issue

Conference Information
Committee ICSS
Conference Date 2010/6/24(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Efficient Augmented PAK Protocols
Sub Title (in English)
Keyword(1) PAKE
Keyword(2) augmented PAKE
Keyword(3) on-line/off-line dictionary attacks
Keyword(4) server compromise
Keyword(5) efficiency
1st Author's Name SeongHan SHIN
1st Author's Affiliation Research Center for Information Security, AIST()
2nd Author's Name Kazukuni KOBARA
2nd Author's Affiliation Research Center for Information Security, AIST
3rd Author's Name Hideki IMAI
3rd Author's Affiliation Research Center for Information Security, AIST:Chuo University
Date 2010-07-02
Paper # ISEC2010-32,SITE2010-28,ICSS2010-38
Volume (vol) vol.110
Number (no) 115
Page pp.pp.-
#Pages 6
Date of Issue