Constructing efficient PAKE protocols from identity-based KEM/DEM

Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human-memorable password and a server’s identity. A distinctive feature of IBPAKE protocols, compared to the well-known EKE-like PAKE protocols, is that an adversary who even acquired a user’s password cannot impersonate a server to further investigate user’s sensitive information. We first construct the new IBPAKE protocol using the Boneh- Franklin identity-based encryption (IBE) scheme, and then generalize the protocol by presenting a generic method to yield an efficient IBPAKE protocol from identity-based KEM/DEM. Our fine-grained approach has concrete advantages in terms of performance. First, unnecessary parameters can be removed easily. This allows a straightforward improvement on computational cost and communication bandwidth. Our protocol gives better performance, compared to previously known IBPAKE protocols.

Original languageEnglish
Title of host publicationInformation Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers
EditorsDooho Choi, Ho-Won Kim
PublisherSpringer Verlag
Pages411-422
Number of pages12
ISBN (Print)9783319318745
DOIs
Publication statusPublished - 2016 Jan 1
Event16th International Workshop on Information Security Applications, WISA 2015 - Jeju Island, Korea, Republic of
Duration: 2015 Aug 202015 Aug 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9503
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th International Workshop on Information Security Applications, WISA 2015
CountryKorea, Republic of
CityJeju Island
Period15/8/2015/8/22

Fingerprint

Identity-based
Password
Authenticated Key Exchange
Network protocols
Servers
Server
Identity-based Encryption
Authentication
Cryptography
Computational Cost
Bandwidth
Concretes
Generalise
Communication

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Choi, K. Y., Cho, J., Hwang, J. Y., & Kwon, T. (2016). Constructing efficient PAKE protocols from identity-based KEM/DEM. In D. Choi, & H-W. Kim (Eds.), Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers (pp. 411-422). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9503). Springer Verlag. https://doi.org/10.1007/978-3-319-31875-2_34
Choi, Kyu Young ; Cho, Jihoon ; Hwang, Jung Yeon ; Kwon, Taekyoung. / Constructing efficient PAKE protocols from identity-based KEM/DEM. Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. editor / Dooho Choi ; Ho-Won Kim. Springer Verlag, 2016. pp. 411-422 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{8f109312f4dc47e1a5b64cfdf76d2278,
title = "Constructing efficient PAKE protocols from identity-based KEM/DEM",
abstract = "In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human-memorable password and a server’s identity. A distinctive feature of IBPAKE protocols, compared to the well-known EKE-like PAKE protocols, is that an adversary who even acquired a user’s password cannot impersonate a server to further investigate user’s sensitive information. We first construct the new IBPAKE protocol using the Boneh- Franklin identity-based encryption (IBE) scheme, and then generalize the protocol by presenting a generic method to yield an efficient IBPAKE protocol from identity-based KEM/DEM. Our fine-grained approach has concrete advantages in terms of performance. First, unnecessary parameters can be removed easily. This allows a straightforward improvement on computational cost and communication bandwidth. Our protocol gives better performance, compared to previously known IBPAKE protocols.",
author = "Choi, {Kyu Young} and Jihoon Cho and Hwang, {Jung Yeon} and Taekyoung Kwon",
year = "2016",
month = "1",
day = "1",
doi = "10.1007/978-3-319-31875-2_34",
language = "English",
isbn = "9783319318745",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "411--422",
editor = "Dooho Choi and Ho-Won Kim",
booktitle = "Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers",
address = "Germany",

}

Choi, KY, Cho, J, Hwang, JY & Kwon, T 2016, Constructing efficient PAKE protocols from identity-based KEM/DEM. in D Choi & H-W Kim (eds), Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9503, Springer Verlag, pp. 411-422, 16th International Workshop on Information Security Applications, WISA 2015, Jeju Island, Korea, Republic of, 15/8/20. https://doi.org/10.1007/978-3-319-31875-2_34

Constructing efficient PAKE protocols from identity-based KEM/DEM. / Choi, Kyu Young; Cho, Jihoon; Hwang, Jung Yeon; Kwon, Taekyoung.

Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. ed. / Dooho Choi; Ho-Won Kim. Springer Verlag, 2016. p. 411-422 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Constructing efficient PAKE protocols from identity-based KEM/DEM

AU - Choi, Kyu Young

AU - Cho, Jihoon

AU - Hwang, Jung Yeon

AU - Kwon, Taekyoung

PY - 2016/1/1

Y1 - 2016/1/1

N2 - In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human-memorable password and a server’s identity. A distinctive feature of IBPAKE protocols, compared to the well-known EKE-like PAKE protocols, is that an adversary who even acquired a user’s password cannot impersonate a server to further investigate user’s sensitive information. We first construct the new IBPAKE protocol using the Boneh- Franklin identity-based encryption (IBE) scheme, and then generalize the protocol by presenting a generic method to yield an efficient IBPAKE protocol from identity-based KEM/DEM. Our fine-grained approach has concrete advantages in terms of performance. First, unnecessary parameters can be removed easily. This allows a straightforward improvement on computational cost and communication bandwidth. Our protocol gives better performance, compared to previously known IBPAKE protocols.

AB - In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human-memorable password and a server’s identity. A distinctive feature of IBPAKE protocols, compared to the well-known EKE-like PAKE protocols, is that an adversary who even acquired a user’s password cannot impersonate a server to further investigate user’s sensitive information. We first construct the new IBPAKE protocol using the Boneh- Franklin identity-based encryption (IBE) scheme, and then generalize the protocol by presenting a generic method to yield an efficient IBPAKE protocol from identity-based KEM/DEM. Our fine-grained approach has concrete advantages in terms of performance. First, unnecessary parameters can be removed easily. This allows a straightforward improvement on computational cost and communication bandwidth. Our protocol gives better performance, compared to previously known IBPAKE protocols.

UR - http://www.scopus.com/inward/record.url?scp=84962241375&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962241375&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-31875-2_34

DO - 10.1007/978-3-319-31875-2_34

M3 - Conference contribution

AN - SCOPUS:84962241375

SN - 9783319318745

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 411

EP - 422

BT - Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers

A2 - Choi, Dooho

A2 - Kim, Ho-Won

PB - Springer Verlag

ER -

Choi KY, Cho J, Hwang JY, Kwon T. Constructing efficient PAKE protocols from identity-based KEM/DEM. In Choi D, Kim H-W, editors, Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers. Springer Verlag. 2016. p. 411-422. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-31875-2_34