Constructing efficient PAKE protocols from identity-based KEM/DEM

Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human-memorable password and a server’s identity. A distinctive feature of IBPAKE protocols, compared to the well-known EKE-like PAKE protocols, is that an adversary who even acquired a user’s password cannot impersonate a server to further investigate user’s sensitive information. We first construct the new IBPAKE protocol using the Boneh- Franklin identity-based encryption (IBE) scheme, and then generalize the protocol by presenting a generic method to yield an efficient IBPAKE protocol from identity-based KEM/DEM. Our fine-grained approach has concrete advantages in terms of performance. First, unnecessary parameters can be removed easily. This allows a straightforward improvement on computational cost and communication bandwidth. Our protocol gives better performance, compared to previously known IBPAKE protocols.

Original languageEnglish
Title of host publicationInformation Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers
EditorsDooho Choi, Ho-Won Kim
PublisherSpringer Verlag
Pages411-422
Number of pages12
ISBN (Print)9783319318745
DOIs
Publication statusPublished - 2016 Jan 1
Event16th International Workshop on Information Security Applications, WISA 2015 - Jeju Island, Korea, Republic of
Duration: 2015 Aug 202015 Aug 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9503
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th International Workshop on Information Security Applications, WISA 2015
CountryKorea, Republic of
CityJeju Island
Period15/8/2015/8/22

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Constructing efficient PAKE protocols from identity-based KEM/DEM'. Together they form a unique fingerprint.

  • Cite this

    Choi, K. Y., Cho, J., Hwang, J. Y., & Kwon, T. (2016). Constructing efficient PAKE protocols from identity-based KEM/DEM. In D. Choi, & H-W. Kim (Eds.), Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers (pp. 411-422). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9503). Springer Verlag. https://doi.org/10.1007/978-3-319-31875-2_34