Password-Authenticated Key Exchange (PAKE) allows two parties to establish a common high-entropy secret from a possibly low-entropy pre-shared secret such as a password. In this work, we provide the first PAKE protocol with subversion resilience in the framework of universal composability (UC), where the latter roughly means that UC security still holds even if one of the two parties is malicious and the honest party's code has been subverted (in an undetectable manner). We achieve this result by sanitizing the PAKE protocol from oblivious transfer (OT) due to Canetti et al. (PKC'12) via cryptographic reverse firewalls in the UC framework (Chakraborty et al., EUROCRYPT'22). This requires new techniques, which help us uncover new cryptographic primitives with sanitation-friendly properties along the way (such as OT, dual-mode cryptosystems, and signature schemes). As an additional contribution, we delve deeper in the backbone of communication required in the subversion-resilient UC framework, extending it to the unauthenticated setting, in line with the work of Barak et al. (CRYPTO'05).

Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE / Chakraborty, Suvradip; Magliocco, Lorenzo; Magri, Bernardo; Venturi, Daniele. - 15488:(2024), pp. 101-133. (Intervento presentato al convegno International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) tenutosi a Kolkata; India) [10.1007/978-981-96-0935-2_4].

Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE

Magliocco, Lorenzo;Magri, Bernardo;Venturi, Daniele
2024

Abstract

Password-Authenticated Key Exchange (PAKE) allows two parties to establish a common high-entropy secret from a possibly low-entropy pre-shared secret such as a password. In this work, we provide the first PAKE protocol with subversion resilience in the framework of universal composability (UC), where the latter roughly means that UC security still holds even if one of the two parties is malicious and the honest party's code has been subverted (in an undetectable manner). We achieve this result by sanitizing the PAKE protocol from oblivious transfer (OT) due to Canetti et al. (PKC'12) via cryptographic reverse firewalls in the UC framework (Chakraborty et al., EUROCRYPT'22). This requires new techniques, which help us uncover new cryptographic primitives with sanitation-friendly properties along the way (such as OT, dual-mode cryptosystems, and signature schemes). As an additional contribution, we delve deeper in the backbone of communication required in the subversion-resilient UC framework, extending it to the unauthenticated setting, in line with the work of Barak et al. (CRYPTO'05).
2024
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)
PAKE; subversion resilience; universal composability
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE / Chakraborty, Suvradip; Magliocco, Lorenzo; Magri, Bernardo; Venturi, Daniele. - 15488:(2024), pp. 101-133. (Intervento presentato al convegno International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) tenutosi a Kolkata; India) [10.1007/978-981-96-0935-2_4].
File allegati a questo prodotto
File Dimensione Formato  
Chakraborty_Key-Exchange_2024.pdf

accesso aperto

Note: https://link.springer.com/content/pdf/10.1007/978-981-96-0935-2_4.pdf?pdf=inline link
Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 609.1 kB
Formato Adobe PDF
609.1 kB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1729806
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? 1
social impact