International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

EKE Meets Tight Security in the Universally Composable Framework

Authors:
Xiangyu Liu , Shanghai Jiao Tong University
Shengli Liu , Shanghai Jiao Tong University
Shuai Han , Shanghai Jiao Tong University
Dawu Gu , Shanghai Jiao Tong University
Download:
DOI: 10.1007/978-3-031-31368-4_24
Search ePrint
Search Google
Presentation: Slides
Conference: PKC 2023
Abstract: (Asymmetric) Password-based Authenticated Key Exchange ((a)PAKE) protocols allow two parties establish a session key with a pre-shared low-entropy password. In this paper, we show how Encrypted Key Exchange (EKE) compiler [Bellovin and Merritt, S&P 1992] meets tight security in the Universally Composable (UC) framework. We propose a strong 2DH variant of EKE, denoted by 2DH-EKE, and prove its tight security in the UC framework based on the CDH assumption. The efficiency of 2DH-EKE is comparable to the original EKE, with only O(\lambda) bits growth in communication (\lambda the security parameter), and two (resp., one) extra exponentiation in computation for client (resp., server). We also develop an asymmetric PAKE scheme 2DH-aEKE from 2DH-EKE. The security reduction loss of 2DH-aEKE is N, the total number of client-server pairs. With a meta-reduction, we formally prove that such a factor N is inevitable in aPAKE. Namely, our 2DH-aEKE meets the optimal security loss. As a byproduct, we further apply our technique to PAKE protocols like SPAKE2 and PPK in the relaxed UC framework, resulting in their 2DH variants with tight security from the CDH assumption.
BibTeX
@inproceedings{pkc-2023-32761,
  title={EKE Meets Tight Security in the Universally Composable Framework},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-031-31368-4_24},
  author={Xiangyu Liu and Shengli Liu and Shuai Han and Dawu Gu},
  year=2023
}