Simpler session-key generation from short random passwords

24Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Goldreich and Lindell (CRYPTO'01) recently presented the first protocol for password-authenticated key exchange in the standard model (with no common reference string or set-up assumptions other than the shared password). However, their protocol uses several heavy tools and has a complicated analysis. We present a simplification of the Goldreich-Lindell (GL) protocol and analysis for the special case when the dictionary is of the form D = {0,1}d, i.e. the password is a short random string (like an ATM PIN number). Our protocol can be converted into one for arbitrary dictionaries using a common reference string of logarithmic length. The security bound achieved by our protocol is somewhat worse than the GL protocol. Roughly speaking, our protocol guarantees that the adversary can "break" the scheme with probability at most O(poly(n)/|D|)Ω(1), whereas the GL protocol guarantees a bound of 0(1/|D|). We also present an alternative, more natural definition of security than the "augmented definition" of Goldreich and Lindell, and prove that the two definitions are equivalent. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Nguyen, M. H., & Vadhan, S. (2004). Simpler session-key generation from short random passwords. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2951, 428–445. https://doi.org/10.1007/978-3-540-24638-1_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free