A Method for Making Password-Based Key Exchange Resilient to Server Compromise

@inproceedings{Gentry2006AMF,
  title={A Method for Making Password-Based Key Exchange Resilient to Server Compromise},
  author={C. Gentry and P. D. MacKenzie and Zulfikar Ramzan},
  booktitle={CRYPTO},
  year={2006}
}
  • C. Gentry, P. D. MacKenzie, Zulfikar Ramzan
  • Published in CRYPTO 2006
  • Computer Science
  • This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is desirable to maintain some degree of security even if the server is compromised. A PAKE scheme is said to be resilient to server compromise if an adversary who compromises the server must at least perform an offline dictionary attack to gain any advantage in impersonating a client. (Of course, offline dictionary attacks… CONTINUE READING
    71 Citations
    OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
    • 46
    • Highly Influenced
    • PDF
    Strong Asymmetric PAKE based on Trapdoor CKEM
    • 3
    • Highly Influenced
    • PDF
    Two-Factor Password-Authenticated Key Exchange with End-to-End Security
    Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
    • 18
    • PDF
    Blind Password Registration for Verifier-based PAKE
    • 5
    • PDF
    Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
    • 28
    • PDF
    Separating Standard and Asymmetric Password-Authenticated Key Exchange
    • J. Hesse
    • Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2019
    • 4
    • PDF

    References

    SHOWING 1-10 OF 71 REFERENCES
    Threshold Password-Authenticated Key Exchange
    • 118
    • PDF
    Provably Secure Threshold Password-Authenticated Key Exchange
    • 69
    • PDF
    Server-assisted generation of a strong secret from a password
    • W. Ford, B. S. Kaliski
    • Computer Science
    • Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
    • 2000
    • 197
    • PDF
    Authenticated Key Exchange Secure against Dictionary Attacks
    • 1,341
    • PDF
    Password Authentication Using Multiple Servers
    • 103
    Extended password key exchange protocols immune to dictionary attack
    • David P. Jablon
    • Computer Science
    • Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
    • 1997
    • 164
    • PDF
    Authentication and Key Agreement Via Memorable Passwords
    • 71