RMIT University
Browse

Practical threshold password-authenticated secret sharing protocol

conference contribution
posted on 2024-10-31, 20:02 authored by Xun YiXun Yi, Feng Hao, Liqun Chen, Joseph Liu
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to secret-share a secret s among n servers and protect it with a password pw, so that the client can later recover s from any subset of t of the servers using the password pw, but so that no coalition smaller than t learns anything about s or can mount an offline dictionary attack on the password pw. Some TPASS protocols have appeared in the literature recently. The protocol by Bagherzandi et al. (CCS 2011) leaks the password if a client mistakenly executes the protocol with malicious servers. The first t-out-of-n TPASS protocol for any n > t that does not suffer from this shortcoming was given by Camenisch et al. (CRYPTO 2014). This protocol, proved to be secure in the UC framework, requires the client to involve in many communication rounds so that it becomes impractical for the client. In this paper, we present a practical TPASS protocol which is in particular efficient for the client, who only needs to send a request and receive a response. In addition, we have provided a rigorous proof of security for our protocol in the standard model.

History

Start page

347

End page

365

Total pages

19

Outlet

Proceedings of the 20th European Symposium on Research in Computer Security

Editors

G. Pernul, P. Y. A. Ryan and E. Weippl

Name of conference

ESORICS 2015: Computer Security

Publisher

Springer

Place published

Germany

Start date

2015-09-21

End date

2015-09-25

Language

English

Copyright

© Springer International Publishing Switzerland 215

Former Identifier

2006069492

Esploro creation date

2020-06-22

Fedora creation date

2017-01-11

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC