Security of the J-PAKE Password-Authenticated Key Exchange Protocol

2015 IEEE Symposium on Security and Privacy(2015)

引用 90|浏览76
暂无评分
摘要
J-PAKE is an efficient password-authenticated key exchange protocol that is included in the Open SSL library and is currently being used in practice. We present the first proof of security for this protocol in a well-known and accepted model for authenticated key-exchange, that incorporates online and offline password guessing, concurrent sessions, forward secrecy, server compromise, and loss of session keys. This proof relies on the Decision Square Diffie-Hellman assumption, as well as a strong security assumption for the non-interactive zero-knowledge (NIZK) proofs in the protocol (specifically, simulation-sound extractability). We show that the Schnorr proof-of-knowledge protocol, which was recommended for the J-PAKE protocol, satisfies this strong security assumption in a model with algebraic adversaries and random oracles, and extend the full J-PAKE proof of security to this model. Finally, we show that by modifying the recommended labels in the Schnorr protocol used in J-PAKE, we can achieve a security proof for J-PAKE with a tighter security reduction.
更多
查看译文
关键词
J-PAKE password-authenticated key exchange protocol,Open SSL library,security proof,online password guessing,offline password guessing,concurrent sessions,forward secrecy,server compromise,session keys loss,decision square Diffie-Hellman assumption,noninteractive zero-knowledge proofs,NIZK proofs,simulation-sound extractability,Schnorr proof-of-knowledge protocol,algebraic adversaries,random oracles,security reduction
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要