Security proofs for an efficient password-based key exchange

  • Authors:
  • Emmanuel Bresson;Olivier Chevassut;David Pointcheval

  • Affiliations:
  • CELAR, Bruz Cedex, France;Ernest Orlando Lawrence Berkeley National Laboratory, Berkeley, CA;CNRS--Ecole normale superieure, Paris Cedex, France

  • Venue:
  • Proceedings of the 10th ACM conference on Computer and communications security
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Password-based key exchange schemes are designed to provide entities communicating over a public network, and sharing a (short) password only, with a session key (e.g, the key is used for data integrity and/or confidentiality). The focus of the present paper is on the analysis of very efficient schemes that have been proposed to the IEEE P1363 Standard working group on password-based authenticated key-exchange methods, but which actual security was an open problem. We analyze the AuthA key exchange scheme and give a complete proof of its security. Our analysis shows that the AuthA protocol and its multiple modes of operations are provably secure under the computational Diffie-Hellman intractability assumption, in both the random-oracle and the ideal-ciphers models.