In this work, we present a novel T-PAKE protocol which solves the above fault management problem by employing a batched and offline phase of distributed key generation (DKG). Our protocol is secure against any malicious behavior from up to any t < n servers under the decisional Diffie-Hellman assumption in the random oracle model, and it ensures protocol completion for t < n/2. Moreover, it is efficient (16n + 7 exponentiations per client, 20n + 14 per server), performs explicit authentication in three communication rounds, and requires a significantly lesser number of broadcast rounds compared to previous secure T-PAKE constructions. We have implemented our protocol, and have verified its efficiency using micro-benchmark experiments. Our experimental results show that the protocol only introduces a computation overhead of few milliseconds at both the client and the server ends, and it is practical for use in real-life authentication scenarios.
Category / Keywords: cryptographic protocols / password authentication, key exchange, fault tolerance, threshold cryptography, round complexity, distributed key generation, dictionary attack Date: received 7 Apr 2014, last revised 30 Jul 2014 Contact author: pryvalov at cs uni-saarland de Available format(s): PDF | BibTeX Citation Version: 20140730:194956 (All versions of this report) Short URL: ia.cr/2014/247 Discussion forum: Show discussion | Start new discussion