Paper 2000/057
Session-Key Generation using Human Passwords Only
Oded Goldreich and Yehuda Lindell
Abstract
We present session-key generation protocols in a model where the
legitimate parties share {\em only} a human-memorizable
password, and there is no additional setup assumption in the
network. Our protocol is proven secure under the assumption that
trapdoor permutations exist. The security guarantee holds with
respect to probabilistic polynomial-time adversaries that control
the communication channel (between the parties), and may omit,
insert and modify messages at their choice. Loosely speaking, the
effect of such an adversary that attacks an execution of our
protocol is comparable to an attack in which an adversary is only
allowed to make a constant number of queries of the form ``is
Metadata
- Available format(s)
-
PDF PS
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. An extended abstract appeared in CRYPTO 2001. This is the full version.
- Contact author(s)
- lindell @ cs biu ac il
- History
- 2005-01-25: last of 7 revisions
- 2000-11-07: received
- See all versions
- Short URL
- https://ia.cr/2000/057
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2000/057, author = {Oded Goldreich and Yehuda Lindell}, title = {Session-Key Generation using Human Passwords Only}, howpublished = {Cryptology {ePrint} Archive, Paper 2000/057}, year = {2000}, url = {https://eprint.iacr.org/2000/057} }