Advertisement

Password-Based Authenticated Key Exchange from Lattices for Client/Server Model

  • Yi-Siou Jheng
  • Raylin Tso
  • Chien-Ming Chen
  • Mu-En Wu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

We proposes a password-based authenticated key exchange from lattices for Client/Server model. The client only has to remember the password shared with the server, and the server records the password in addition to its own public/private key pair. Both parties execute the mutual authentication via the shared password and accomplish the key exchange within two steps. The security of our protocol is based on the LWE problem of lattices, so it is secure even an attacker uses a quantum computer.

Keywords

Client-Sever model Lattice Mutual authentication PAKE 

Notes

Acknowledgments

The work of Chien-Ming Chen was supported in part by the Project NSFC (National Natural Science Foundation of China) under Grant Number 61402135 and in part by Shenzhen Technical Project under Grant Number JCYJ20150513151706574. The research of Raylin Tso was supported by Ministry of Science and Technology, Taiwan, under Grant No. MOST 105-2221-E-004-001-MY3.

References

  1. 1.
    Shieh, W.G., Wang, J.M.: Efficient remote mutual authentication and key agreement. Comput. Secur. 25(1), 72–77 (2006)CrossRefGoogle Scholar
  2. 2.
    Seo, B., Lee, S.W., Kim, H.: Authenticated key agreement based on NFC for mobile payment. Int. J. Comput. Commun. Eng. 5(1), 71 (2016)CrossRefGoogle Scholar
  3. 3.
    Xun, Y., Tso, R., Okamoto, E.: Identity-based password-authenticated key exchange for client/server model. In: SECRYPT, pp. 45–51 (2012)Google Scholar
  4. 4.
    Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Transactions on Computational Science XI, pp. 192–206. Springer, Heidelberg (2010)Google Scholar
  5. 5.
    Ding, J., Xie, X., Lin, X.: A simple provably secure key exchange scheme based on the learning with errors problem. IACR Cryptology EPrint Archive 2012/688 (2012) Google Scholar
  6. 6.
    Zhang, J., Zhang, Z., Ding, J., Snook, M., Dagdelen, Ö.: Authenticated key exchange from ideal lattices. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 719–751. Springer, Heidelberg (2015)Google Scholar
  7. 7.
    Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Yi-Siou Jheng
    • 1
  • Raylin Tso
    • 1
  • Chien-Ming Chen
    • 2
  • Mu-En Wu
    • 3
  1. 1.Department of Computer ScienceNational Chengchi UniversityTaipeiTaiwan
  2. 2.School of Computer Science and TechnologyHarbin Institute of Technology Shenzhen Graduate SchoolShenzhenChina
  3. 3.Department of MathematicsSoochow UniversityTaipeiTaiwan

Personalised recommendations