Security of the J-PAKE password-authenticated key exchange protocol

69Citations
Citations of this article
78Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

J-PAKE is an efficient password-authenticated key exchange protocol that is included in the Open SSL library and is currently being used in practice. We present the first proof of security for this protocol in a well-known and accepted model for authenticated key-exchange, that incorporates online and offline password guessing, concurrent sessions, forward secrecy, server compromise, and loss of session keys. This proof relies on the Decision Square Diffie-Hellman assumption, as well as a strong security assumption for the non-interactive zero-knowledge (NIZK) proofs in the protocol (specifically, simulation-sound extractability). We show that the Schnorr proof-of-knowledge protocol, which was recommended for the J-PAKE protocol, satisfies this strong security assumption in a model with algebraic adversaries and random oracles, and extend the full J-PAKE proof of security to this model. Finally, we show that by modifying the recommended labels in the Schnorr protocol used in J-PAKE, we can achieve a security proof for J-PAKE with a tighter security reduction.

Cite

CITATION STYLE

APA

Abdalla, M., Benhamouda, F., & MacKenzie, P. (2015). Security of the J-PAKE password-authenticated key exchange protocol. In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2015-July, pp. 571–587). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SP.2015.41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free