Paper 2013/127
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer and Mark Manulis
Abstract
In this work we introduce the notion of Oblivious Password based Authenticated Key Exchange (O-PAKE) and a compiler to transform a large class of PAKE into O-PAKE protocols. O-PAKE allows a client that shares one password with a server to use a set of passwords within one PAKE session. It succeeds if and only if one of those input passwords matches the one stored on the server side. The term oblivious is used to emphasise that no information about any password, input by the client, is made available to the server. Using special processing techniques, our O-PAKE compiler reaches nearly constant run time on the server side, independent of the size of the client’s password set. We prove security of the O-PAKE compiler under standard assumptions using the latest game-based PAKE model by Abdalla, Fouque and Pointcheval (PKC 2005), tailored to our needs. We identify the requirements that PAKE protocols must satisfy in order to suit the compiler and give two concrete O-PAKE instantiation.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Not published yet
- Keywords
- Password Based Authenticated Key Exchange
- Contact author(s)
- f kiefer @ surrey ac uk
- History
- 2015-06-04: last of 4 revisions
- 2013-03-05: received
- See all versions
- Short URL
- https://ia.cr/2013/127
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/127, author = {Franziskus Kiefer and Mark Manulis}, title = {Oblivious {PAKE}: Efficient Handling of Password Trials}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/127}, year = {2013}, url = {https://eprint.iacr.org/2013/127} }