Publication | Closed Access
Practical yet universally composable two-server password-authenticated secret sharing
64
Citations
21
References
2012
Year
Unknown Venue
Hardware SecurityCryptographic PrimitiveEngineeringSecurity DefinitionPassword-authenticated Secret SharingInformation SecurityCryptographic ProtectionIdentity-based SecurityCloud ComputingData PrivacyPrivacy-preserving CommunicationConcrete 2PassComputer ScienceFormal VerificationAuthentication ProtocolAuthentication Access ControlData SecurityCryptography
Password-authenticated secret sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS 2011, allow users to distribute data among several servers so that the data can be recovered using a single human-memorizable password, but no single server (or even no collusion of servers up to a certain size) can mount an off-line dictionary attack on the password or learn anything about the data. We propose a new, universally composable (UC) security definition for the two-server case (2PASS) in the public-key setting that addresses a number of relevant limitations of the previous, non-UC definition. For example, our definition makes no prior assumptions on the distribution of passwords, preserves security when honest users mistype their passwords, and guarantees secure composition with other protocols in spite of the unavoidable non-negligible success rate of online dictionary attacks. We further present a concrete 2PASS protocol and prove that it meets our definition. Given the strong security guarantees, our protocol is surprisingly efficient: in its most efficient instantiation under the DDH assumption in the random-oracle model, it requires fewer than twenty elliptic-curve exponentiations on the user's device. We achieve our results by careful protocol design and by exclusively focusing on the two-server public-key setting.
| Year | Citations | |
|---|---|---|
Page 1
Page 1