《计算机应用》唯一官方网站 ›› 2024, Vol. 44 ›› Issue (3): 805-810.DOI: 10.11772/j.issn.1001-9081.2023040417

• 网络空间安全 • 上一篇    下一篇

格上无非交互式零知识证明的两轮三方PAKE协议

尹新媛, 郑小建(), 熊金波   

  1. 福建师范大学 计算机与网络空间安全学院,福州 350117
  • 收稿日期:2023-04-12 修回日期:2023-07-05 接受日期:2023-07-10 发布日期:2023-12-04 出版日期:2024-03-10
  • 通讯作者: 郑小建
  • 作者简介:尹新媛(2002—),女,山东临沂人,主要研究方向:口令认证密钥交换协议
    熊金波(1981—),男,湖南益阳人,教授,博士,CCF高级会员,主要研究方向:大数据安全、隐私保护。
  • 基金资助:
    国家自然科学基金资助项目(62272102)

Two-round three-party password-authenticated key exchange protocol over lattices without non-interactive zero-knowledge proof

Xinyuan YIN, Xiaojian ZHENG(), Jinbo XIONG   

  1. College of Computer and Cyber Security,Fujian Normal University,Fuzhou Fujian 350117,China
  • Received:2023-04-12 Revised:2023-07-05 Accepted:2023-07-10 Online:2023-12-04 Published:2024-03-10
  • Contact: Xiaojian ZHENG
  • About author:YIN Xinyuan, born in 2002. Her research interests include password-authenticated key exchange protocol.
    XIONG Jinbo, born in 1981, Ph. D., professor. His research interests include big data security,privacy protection.
  • Supported by:
    National Natural Science Foundation of China(62272102)

摘要:

针对现有基于格的三方口令认证密钥交换(PAKE)协议通信轮次较多、执行效率较低等问题,提出一种格上无非交互式零知识证明的两轮三方PAKE协议。首先,利用非适应性近似平滑投影哈希函数实现密钥交换,在不使用非交互式零知识(NIZK)证明的前提下,降低协议的通信轮数;其次,利用哈希值和投影哈希值构造会话密钥,不需要使用随机预言机,避免了随机预言机导致的潜在口令猜测攻击。在标准模型下给出所提协议的形式化安全证明。仿真结果表明,与基于格的三方PAKE协议相比,所提协议的执行时间在客户端缩短了89.2%~98.6%,在服务器端缩短了19.0%~91.6%。验证了所提协议能够抵抗量子攻击,具有较高的执行效率,同时减少了协议通信轮数。

关键词: 格, 三方密钥交换, 口令认证密钥交换, 非交互式零知识, 可证明安全

Abstract:

Focused on the issues of high communication rounds and low execution efficiency in existing lattice-based three-party Password-Authenticated Key Exchange (PAKE) protocols, a two-round three-party PAKE protocol over lattices without Non-Interactive Zero-Knowledge (NIZK) proof was proposed. First, the advantage of non-adaptive approximate smooth projective hash function was taken to achieve key exchange and reduce the number of communication rounds without NIZK proof. Second, session keys were constructed by using hash values and projection hash values without random oracles, thus avoiding potential password guessing attacks. Finally, formal security proof of the proposed protocol was given in the standard model. Simulation results show that compared with lattice-based three-party PAKE protocols, the proposed protocol has the execution time reduced by 89.2% - 98.6% on the client side and 19.0% - 91.6% on the server side. It is verified that the proposed protocol can resist quantum attacks with high execution efficiency and few communication rounds.

Key words: lattice, three-party key exchange, Password-Authenticated Key Exchange (PAKE), Non-Interactive Zero-Knowledge (NIZK), provably secure

中图分类号: