Mitigating server breaches in password-based authentication: Secure and efficient solutions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based on a shared “human-memorable” password without requiring a public-key infrastructure. It is one of the most widely used and fundamental cryptographic primitives. Unfortunately, mass password theft from organizations is continually in the news and, even if passwords are salted and hashed, brute force breaking of password hashing is usually very successful in practice. In this paper, we propose two efficient protocols where the password database is somehow shared among two servers (or more), and authentication requires a distributed computation involving the client and the servers. In this scenario, even if a server compromise is doable, the secret exposure is not valuable to the adversary since it reveals only a share of the password database and does not permit to brute force guess a password without further interactions with the parties for each guess. Our protocols rely on smooth projective hash functions and are proven secure under classical assumption in the standard model (i.e. do not require idealized assumption, such as random oracles).

Original languageEnglish
Title of host publicationTopics in Cryptology - The Cryptographers Track at the RSA Conference, CT-RSA 2016
EditorsKazue Sako
PublisherSpringer Verlag
Pages3-18
Number of pages16
ISBN (Print)9783319294841
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
Event2016 Conference on Cryptographer's Track at the RSA, CT-RSA 2016 - San Francisco, United States
Duration: 29 Feb 20164 Mar 2016

Publication series

NameLecture Notes in Computer Science
Volume9610
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2016 Conference on Cryptographer's Track at the RSA, CT-RSA 2016
Country/TerritoryUnited States
CitySan Francisco
Period29/02/164/03/16

Keywords

  • Decision diffie-hellman
  • Distributed computation
  • Password-authenticated key exchange
  • Smooth projective hashing

Fingerprint

Dive into the research topics of 'Mitigating server breaches in password-based authentication: Secure and efficient solutions'. Together they form a unique fingerprint.

Cite this