Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
نویسندگان
چکیده
We show by counter-example that the soundness security requirement for witness encryp-tion given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the securityof their own applications. We introduce adaptively-sound (AS) witness encryption to fill thegap. We then introduce asymmetric password-based encryption (A-PBE). This offers gains overclassical, symmetric password-based encryption in the face of attacks that compromise serversto recover hashed passwords. We distinguish between invasive A-PBE schemes (they introducenew password-based key-derivation functions) and non-invasive ones (they can use existing, de-ployed password-based key-derivation functions). We give simple and efficient invasive A-PBEschemes and use AS-secure witness encryption to give non-invasive A-PBE schemes. 1 Department of Computer Science & Engineering, University of California San Diego, 9500 Gilman Drive, LaJolla, California 92093, USA. Email: [email protected]. URL: http://cseweb.ucsd.edu/~mihir/. Supported inpart by NSF grants CNS-1116800 and CNS-1228890.Department of Computer Science, University of Maryland, College Park, and Department of Computer Science,Georgetown University, 37th and O Streets, NW, Washington, DC 20057, USA. Email: [email protected]. URL:http://csiflabs.cs.ucdavis.edu/~tvhoang/. Supported in part by NSF award CNS-1223623. Part of the workwas done while Hoang was working at UCSD and supported in part by NSF grants CNS-1116800, and CNS-1228890.
منابع مشابه
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE
We introduce a novel notion of smooth (-verifier) noninteractive zero-knowledge proofs (NIZK) which parallels the familiar notion of smooth projective hash functions (SPHF). We also show that the recent single group element quasi-adaptive NIZK (QA-NIZK) of Jutla and Roy (CRYPTO 2014) for linear subspaces can be easily extended to be computationally smooth. One important distinction of the new n...
متن کاملIdentity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key cryptography eliminates the need for certificates and solves certain public key management problems in traditional public-key cryptosystems. Recently, the notion of asymmetric group key agreement was introduced, in which the...
متن کاملPassword-Based Encryption Analyzed
The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the context of a recent line of research that aims to justify symbolic models in terms of more concrete, computational ones. We offer two models for reasoning about the concurrent use of symmetric, asymmetric, and passwordbased encrypt...
متن کاملEnhanced Security Architecture for Cloud Data Security
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...
متن کاملBiovault: Biometrically Based Encryption
Biometric based characteristic authentication is an asymmetric [1] authentication technology. This means that the reference biometric data generated during the enrolment process and stored in the biometric database, will never match any freshly offered biometric data exactly (100%). This is commonly accepted due to the nature of the biometric algorithm [2] central to the biometric environment. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013