首页> 外文期刊>ACM Transactions on Internet Technology >Password-Authenticated Group Key Exchange: A Cross-Layer Design
【24h】

Password-Authenticated Group Key Exchange: A Cross-Layer Design

机译:密码验证的组密钥交换:跨层设计

获取原文
获取原文并翻译 | 示例
           

摘要

Two-party password-authenticated key exchange (2PAKE) protocols provide a natural mechanism for secret key establishment in distributed applications, and they have been extensively studied in past decades. However, only a few efforts have been made so far to design password-authenticated group key exchange (GPAKE) protocols. In a 2PAKE or GPAKE protocol, it is assumed that short passwords are preshared among users. This assumption, however, would be impractical in certain applications. Motivated by this observation, this article presents a GPAKE protocol without the password sharing assumption. To obtain the passwords, wireless devices, such as smart phones, tablets, and laptops, are used to extract short secrets at the physical layer. Using the extracted secrets, users in our protocol can establish a group key at higher layers with light computation consumptions. Thus, our GPAKE protocol is a cross-layer design. Additionally, our protocol is a compiler, that is, our protocol can transform any provably secure 2PAKE protocol into a GPAKE protocol with only one more round of communications. Besides, the proposed protocol is proved secure in the standard model.
机译:两方密码认证的密钥交换(2PAKE)协议为分布式应用程序中的秘密密钥建立提供了一种自然的机制,并且在过去的几十年中进行了广泛的研究。但是,到目前为止,在设计经过密码验证的组密钥交换(GPAKE)协议方面仅作了很少的努力。在2PAKE或GPAKE协议中,假定在用户之间预先共享了短密码。但是,这种假设在某些应用中是不切实际的。基于这种观察,本文提出了一个没有密码共享假设的GPAKE协议。为了获取密码,使用无线设备(例如智能手机,平板电脑和笔记本电脑)在物理层提取短密码。使用提取的秘密,我们协议中的用户可以在较高的层上建立组密钥,从而减少计算量。因此,我们的GPAKE协议是跨层设计。另外,我们的协议是编译器,也就是说,我们的协议可以将任何可证明安全的2PAKE协议转换为GPAKE协议,而仅需进行一轮以上的通信。此外,该协议在标准模型中被证明是安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号