Paper 2024/307
SweetPAKE: Key exchange with decoy passwords
Abstract
Decoy accounts are often used as an indicator of the compromise of sensitive data, such as password files. An attacker targeting only specific known-to-be-real accounts might, however, remain undetected. A more effective method proposed by Juels and Rivest at CCS'13 is to maintain additional fake passwords associated with each account. An attacker who gains access to the password file is unable to tell apart real passwords from fake passwords, and the attempted usage of a false password immediately sets off an alarm indicating a password file compromise.
Password-Authenticated Key Exchange (PAKE) has long been recognised for its strong security guarantees when it comes to low-entropy password authentication and secure channel establishment, without having to rely on the setup of a PKI. In this paper, we introduce SweetPAKE, a new cryptographic primitive that offers the same security guarantees as PAKE for key exchange, while allowing clients with a single password to authenticate against servers with
Note: This is the full version of the paper to appear in the proceedings of AsiaCCS'24, with comprehensive proofs of all theorems presented.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Minor revision. AsiaCCS'24
- Keywords
- SweetPAKEHoneywordsPAKEPAPKEOblivious PAKE
- Contact author(s)
-
afonso arriaga @ gmail com
peter ryan @ uni lu
marjan skrobot @ uni lu - History
- 2024-02-26: approved
- 2024-02-23: received
- See all versions
- Short URL
- https://ia.cr/2024/307
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/307, author = {Afonso Arriaga and Peter Y.A. Ryan and Marjan Skrobot}, title = {{SweetPAKE}: Key exchange with decoy passwords}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/307}, year = {2024}, url = {https://eprint.iacr.org/2024/307} }