2014
DOI: 10.1007/978-3-319-07536-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange

Abstract: Abstract. Smooth projective hash functions have been used as building block for various cryptographic applications, in particular for password-based authentication. In this work we propose the extended concept of distributed smooth projective hash functions where the computation of the hash value is distributed across n parties and show how to instantiate the underlying approach for languages consisting of Cramer-Shoup ciphertexts. As an application of distributed smooth projective hashing we build a new frame… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…[15], where the client password is secretly shared amongst two servers from which at most one is assumed to be compromisable. Under this security assumption 2PAKE servers fully eliminate threats from offline dictionary attacks.…”
Section: Resultsmentioning
confidence: 99%
“…[15], where the client password is secretly shared amongst two servers from which at most one is assumed to be compromisable. Under this security assumption 2PAKE servers fully eliminate threats from offline dictionary attacks.…”
Section: Resultsmentioning
confidence: 99%
“…Future work may include extension of the ZKPPC concept towards TwoServer PAKE (2PAKE) protocols, e.g. [15], where the client password is secretly shared amongst two servers from which at most one is assumed to be compromisable. Under this security assumption 2PAKE servers fully eliminate threats from offline dictionary attacks.…”
Section: Resultsmentioning
confidence: 99%
“…π = s 0 + s 1 mod q over a prime-order group G q . Such sharing has been used in various 2PAKE protocols, including [15,23,24,25]. To be used in combination with 2PASS protocols such as [17] one can define the password as g π and thus adopts the multiplicative sharing g π = g s0 g s1 .…”
Section: Password Sharingmentioning
confidence: 99%
“…Application to existing 2PAKE/2PASS protocols Our 2BPR protocol can be used to register passwords for 2PAKE and 2PASS protocols that adopt additive password sharing in Z q or multiplicative sharing in G. This includes 2PAKE protocols from [15,25] for which no password registration procedures were addressed. Integration of 2BPR into 2PASS protocols is more involved since password registration is considered to be part of the 2PASS protocol during the secret sharing phase.…”
Section: Performance and Use With 2pake/2pass Protocolsmentioning
confidence: 99%