Skip to main content
Top

2018 | OriginalPaper | Chapter

Password-Based Authenticated Key Exchange from Lattices for Client/Server Model

Authors : Yi-Siou Jheng, Raylin Tso, Chien-Ming Chen, Mu-En Wu

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We proposes a password-based authenticated key exchange from lattices for Client/Server model. The client only has to remember the password shared with the server, and the server records the password in addition to its own public/private key pair. Both parties execute the mutual authentication via the shared password and accomplish the key exchange within two steps. The security of our protocol is based on the LWE problem of lattices, so it is secure even an attacker uses a quantum computer.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shieh, W.G., Wang, J.M.: Efficient remote mutual authentication and key agreement. Comput. Secur. 25(1), 72–77 (2006)CrossRef Shieh, W.G., Wang, J.M.: Efficient remote mutual authentication and key agreement. Comput. Secur. 25(1), 72–77 (2006)CrossRef
2.
go back to reference Seo, B., Lee, S.W., Kim, H.: Authenticated key agreement based on NFC for mobile payment. Int. J. Comput. Commun. Eng. 5(1), 71 (2016)CrossRef Seo, B., Lee, S.W., Kim, H.: Authenticated key agreement based on NFC for mobile payment. Int. J. Comput. Commun. Eng. 5(1), 71 (2016)CrossRef
3.
go back to reference Xun, Y., Tso, R., Okamoto, E.: Identity-based password-authenticated key exchange for client/server model. In: SECRYPT, pp. 45–51 (2012) Xun, Y., Tso, R., Okamoto, E.: Identity-based password-authenticated key exchange for client/server model. In: SECRYPT, pp. 45–51 (2012)
4.
go back to reference Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Transactions on Computational Science XI, pp. 192–206. Springer, Heidelberg (2010) Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Transactions on Computational Science XI, pp. 192–206. Springer, Heidelberg (2010)
5.
go back to reference Ding, J., Xie, X., Lin, X.: A simple provably secure key exchange scheme based on the learning with errors problem. IACR Cryptology EPrint Archive 2012/688 (2012) Ding, J., Xie, X., Lin, X.: A simple provably secure key exchange scheme based on the learning with errors problem. IACR Cryptology EPrint Archive 2012/688 (2012)
6.
go back to reference Zhang, J., Zhang, Z., Ding, J., Snook, M., Dagdelen, Ö.: Authenticated key exchange from ideal lattices. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 719–751. Springer, Heidelberg (2015) Zhang, J., Zhang, Z., Ding, J., Snook, M., Dagdelen, Ö.: Authenticated key exchange from ideal lattices. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 719–751. Springer, Heidelberg (2015)
7.
go back to reference Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRef Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRef
Metadata
Title
Password-Based Authenticated Key Exchange from Lattices for Client/Server Model
Authors
Yi-Siou Jheng
Raylin Tso
Chien-Ming Chen
Mu-En Wu
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_52