Paper published in a book (Scientific congresses, symposiums and conference proceedings)
SweetPAKE: Key exchange with decoy passwords
DELERUE ARRIAGA, Afonso; RYAN, Peter Y A; SKROBOT, Marjan
2024In SweetPAKE: Key exchange with decoy passwords
Peer reviewed
 

Files


Full Text
2024-307.pdf
Author postprint (696.36 kB) Creative Commons License - Attribution
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Honeywords; Oblivious PAKE; PAKE; Password-Authenticated Public-Key Encryption; SweetPAKE; Honeyword; Key-exchange; Oblivious password-authenticated key exchange; Password-authenticated key exchange; Password-authenticated public-key encryption; Public-key encryption; Secure channels; Session key; Computational Theory and Mathematics; Computer Networks and Communications; Computer Science Applications
Abstract :
[en] Decoy accounts are often used as an indicator of the compromise of sensitive data, such as password files. An attacker targeting only specific known-to-be-real accounts might, however, remain undetected. A more effective method proposed by Juels and Rivest at CCS’13 is to maintain additional fake passwords associated with each account. An attacker who gains access to the password file is unable to tell apart real passwords from fake passwords, and the attempted usage of a false password immediately sets off an alarm indicating a password file compromise. Password-Authenticated Key Exchange (PAKE) has long been recognised for its strong security guarantees when it comes to low-entropy password authentication and secure channel establishment, without having to rely on the setup of a PKI. In this paper, we introduce SweetPAKE, a new cryptographic primitive that offers the same security guarantees as PAKE for key exchange, while allowing clients with a single password to authenticate against servers with n candidate passwords for that account and establish a secure channel. Additional security properties are identified and formalized to ensure that (a) high-entropy session keys are indistinguishable from random, even if later on the long-term secret password becomes corrupted (forward secrecy); (b) upon password file leakage, an adversary cannot tell apart real from fake passwords; and (c) a malicious client cannot trigger a false alarm. We capture these properties by extending well-established game-based definitions of PAKE. Furthermore, we propose a new UC formulation that comprehensively unifies both SweetPAKE (session key indistinguishability and sugarword indistinguishability) and a related notion known as Oblivious-PAKE. Finally, we propose efficient SweetPAKE and Oblivious-PAKE protocols constructed from Password-Authenticated Public-Key Encryption (PAPKE) that satisfy all the proposed notions.
Disciplines :
Computer science
Author, co-author :
DELERUE ARRIAGA, Afonso  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA
RYAN, Peter Y A  ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
SKROBOT, Marjan  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA
External co-authors :
no
Language :
English
Title :
SweetPAKE: Key exchange with decoy passwords
Publication date :
July 2024
Event name :
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
Event place :
Singapore, Singapore
Event date :
01-07-2024 => 05-07-2024
Audience :
International
Main work title :
SweetPAKE: Key exchange with decoy passwords
Main work alternative title :
[en] SweetPAKE
Publisher :
Association for Computing Machinery, Inc, United States
ISBN/EAN :
9798400704826
Pages :
1017–1033
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
FnR Project :
C21/IS/16236053/FuturePass, C21/IS/16221219/ImPAKT
Funders :
ACM SIGSAC
Funding text :
We thank the anonymous reviewers of AsiaCCS 2024 for their comments and suggestions. Afonso Arriaga and Marjan \u0160krobot received support from the Luxembourg National Research Fund (FNR) under the CORE Junior project (C21/IS/16236053/FuturePass). Peter Y.A. Ryan received support from the Luxembourg National Research Fund (FNR) under the CORE project (C21/IS/16221219/ImPAKT). Additionally, we extend our thanks to Steve Meireles for his contribution to the implementation of the proposed protocols.
Available on ORBilu :
since 04 November 2024

Statistics


Number of views
90 (1 by Unilu)
Number of downloads
30 (0 by Unilu)

Scopus citations®
 
1
Scopus citations®
without self-citations
1
OpenCitations
 
0
OpenAlex citations
 
0
WoS citations
 
0

Bibliography


Similar publications



Contact ORBilu