Cryptology ePrint Archive: Report 2014/426
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
Abstract: We propose a new approach to the construction of secret-key authentication protocols making black-box use of a pseudorandom generator (PRG). Our authentication protocols require only two messages, have perfect completeness, and achieve concurrent man-in-the-middle security. Finally, when based on a sufficiently efficient PRG, our protocol has (amortised) complexity $O(n)$ bit operations where $n$ is the security parameter. To the best of our knowledge, this construction is the first with linear complexity. We achieve this at the cost of having the prover (but not the verifier) keep a small amount of state. A variant of our construction, based on a stronger security notion for the PRG, is secure even if the adversary is able to reset the prover an unbounded number of times. A practical analysis of our protocol shows our prover computation time compares favorably against a simple AES-based protocol.
Category / Keywords: Authentication, pseudorandom generators, linear time
Date: received 4 Jun 2014, last revised 20 Oct 2015
Contact author: sunoo at csail mit edu
Available format(s): PDF | BibTeX Citation
Version: 20151021:013734 (All versions of this report)
Short URL: ia.cr/2014/426
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]