University of Wollongong
Browse

Cross-domain password-based authenticated key exchange revisited

Download (1.11 MB)
journal contribution
posted on 2024-11-15, 14:52 authored by Liqun Chen, Hoon Wei Lim, Guomin Yang
We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share with their respective domain authentication servers. On the other hand, the authentication servers, assumed to be part of a standard PKI, act as ephemeral CAs that certify some key materials that the users can subsequently use to exchange and agree on as a session key. Moreover, we adopt a compositional approach. That is, by treating any secure two-party password-based key exchange (2PAKE) protocol and two-party asymmetric-key/symmetric-key-based key exchange (2A/SAKE) protocol as black boxes, we combine them to obtain generic and provably secure 4PAKE protocols. 2014 ACM.

History

Citation

Chen, L., Lim, H. Wei. & Yang, G. (2014). Cross-domain password-based authenticated key exchange revisited. ACM Transactions on Information and System Security, 16 (4), 15-1-15-31.

Journal title

ACM Transactions on Information and System Security

Volume

16

Issue

4

Publisher website/DOI

Language

English

RIS ID

90597

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC