Paper 2015/188

New Techniques for SPHFs and Efficient One-Round PAKE Protocols

Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, and Damien Vergnaud

Abstract

Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell's approach, with a new kind of smooth-projective hash functions (SPHFs), Katz and Vaikuntanathan recently came up with the first concrete one-round PAKE protocols, where the two players just have to send simultaneous flows to each other. The first one is secure in the Bellare-Pointcheval-Rogaway (BPR) model and the second one in the Canetti's UC framework, but at the cost of simulation-sound non-interactive zero-knowledge (SSNIZK) proofs (one for the BPR-secure protocol and two for the UC-secure one), which make the overall constructions not really efficient. This paper follows their path with, first, a new efficient instantiation of SPHF on Cramer-Shoup ciphertexts, which allows to get rid of the SSNIZK proof and leads to the design of the most efficient one-round PAKE known so far, in the BPR model, and in addition without pairings. In the UC framework, the security proof required the simulator to be able to extract the hashing key of the SPHF, hence the additional SSNIZK proof. We improve the way the latter extractability is obtained by introducing the notion of trapdoor smooth projective hash functions (TSPHFs). Our concrete instantiation leads to the most efficient one-round PAKE UC-secure against static corruptions to date. We additionally show how these SPHFs and TSPHFs can be used for blind signatures and zero-knowledge proofs with straight-line extractability.

Note: Merge of https://eprint.iacr.org/2013/034 and https://eprint.iacr.org/2013/341. 2015-10-02: mention of the fact that the core idea of our generic framework was already present in the paper "Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption" from Cramer and Shoup (https://eprint.iacr.org/2001/085).

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A minor revision of an IACR publication in CRYPTO 2013
DOI
10.1007/978-3-642-40041-4_25
Keywords
Authenticated Key ExchangeBlind SignaturesSmooth Projective Hash FunctionsZero-Knowledge ArgumentsVerifiable EncryptionTrapdoor Smooth Projective Hash Functions
Contact author(s)
fabrice ben hamouda @ ens fr
History
2015-10-02: last of 2 revisions
2015-03-04: received
See all versions
Short URL
https://ia.cr/2015/188
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/188,
      author = {Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud},
      title = {New Techniques for {SPHFs} and Efficient One-Round {PAKE} Protocols},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/188},
      year = {2015},
      doi = {10.1007/978-3-642-40041-4_25},
      url = {https://eprint.iacr.org/2015/188}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.