
Provably Secure Two-Round PAKE Based on Ciphertext Standard Language over Lattices
YIN An-qi, QU Tong-zhou, GUO Yuan-bo, WANG Ding, CHEN Lin, LI Yong-fei
ACTA ELECTRONICA SINICA ›› 2022, Vol. 50 ›› Issue (5) : 1140-1149.
Provably Secure Two-Round PAKE Based on Ciphertext Standard Language over Lattices
Reducing the communication round complexity and security assumptions are important directions of password-based authenticated key exchange(PAKE) protocol over lattices. Smooth projective Hash function(SPHF) is an important mathematical tool for constructing PAKE. But most of the existing lattice-based SPHFs cannot be applied under hyperpolynomial modulus. This paper proposes two SPHFs based on the standard language of ciphertext over lattices, which solves the above problem without increasing communication and storage overhead. Based on the proposed SPHFs, this paper proposes a provably secure two-round PAKE protocol over lattices, which can resist quantum attacks and reduce the communication round complexity and the security assumptions without random oracle and zero-knowledge proof. And this paper also provides a strict security proof for the proposed protocol based on a more accurate security model. Experiment results show that the protocol proposed has better communication round complexity, computational overhead, security assumptions and actual security.
password / key exchange / SPHF(Smooth Projective Hash Function) / provably secure / lattice / post-quantum {{custom_keyword}} /
表1 符号定义 |
符号 | 含义 |
---|---|
n | 安全参数 |
[ A | B ]/[ A || B ] | 矩阵 A 和 B 的横/纵向级联 |
negl(.) | 可忽略函数 |
q | LWE困难问题模数 |
Ham(., .) | 汉明距离函数 |
A T | 矩阵 A 的转置矩阵 |
←/ | 取样/随机取样 |
| D | | 集合D的大小 |
d(., .) | 距离函数(欧式距离) |
|| x || | 向量 x 的欧几里得范数 |
| 非法标识 |
「a⌉/⌊a」 | 大于/小于a的最小/最大整数 |
「a」 | 与a最接近的整数 |
〈., .〉 | 内积运算 |
| ||
---|---|---|
客户u1( | | 服务器s1( |
(1) (2) (3) (4) |
| |
(1) (2) (3) (4) | ||
(5) (6) (7) (8) | (5) (6) (7) | |
(9) 删除除 | (8) 删除除 |
表2 密码原语执行时间 |
操作 | 执行时间 | 操作 | 执行时间 |
---|---|---|---|
MP.Enc | 0.310152048399 | MP.SPHF | 0.00109302669866 |
Reg.Enc | 0.0433926372716 | Reg.SPHF | 0.00593389340693 |
KV.Enc | 0.873595026517 | KV.SPHF | 0.444697060174 |
SPKE.Enc | 13.985888249 | SPKE.SPHF | 0.00112316393037 |
GPV.Enc | 0.1392346325 | GPV.SPHF | 0.0097478549383 |
表4 通信与存储开销对比 |
协议名称 | Z-PAKE[1] | B-PAKE[11] | L-PAKE-1[14] | L-PAKE-2[10] | K-PAKE-1[9] | 本文方案 | |
---|---|---|---|---|---|---|---|
通信 复杂度 | O(2(4m - 2n1 + kn1)logq + k) | O((8m + 2kn - 4n1)logq) | O(2(m + kn)logq) | O(2(m + kn)logq) | O((3mn + 2kn)logq + k) | O(((mn + 1)+ k(n + 1))logq) | |
通信开销 | 1001600 | 1394688 | 940032 | 940032 | 59769984 | 20055552 | |
存 储 复 杂 度 | 客户 | O((2mn + k(m + 2n1) + 8m - 3n1 + n2 + 1)logq + 5k) | O((2mn + k(m + 2n)+ 9m + 3n - 4n1)logq + k) | O((mn + k(m + 2n)+ 2m + 3n + 1)logq + 3k) | O((mn + k(m + 2n)+ 3m + 2n)logq + 3k) | O((mn(3k + 2n + 6)+ n (2k + 1))logq + 5k) | O((mn + 2m + 2n + 1 +(m + n + 1)k)logq + 3k) |
服务器 | O((2mn + k(m + 2n1) + 8m - 3n1 + n2 + 1)logq + 5k) | O((2mn + k(m + 2n)+ 9m + 3n - 4n1)logq + k) | O((mn + k(m + 2n)+ 3m + 3n + 1)logq + 3k) | O((mn + k(m + 2n)+ 3m + 2n)logq + 3k) | O((mn(3k + 2n + 6)+ n (2k + 1))logq + 5k) | O((mn(2k+2n+4) + 3n + 1 +(n + 1)k)logq + 3k) | |
存储 开销 | 客户 | 50157184 | 50633088 | 30440844 | 30514560 | 17734832768 | 30046092 |
服务器 | 50157184 | 50633088 | 30517644 | 30514560 | 17734832768 | 15178541964 |
1 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
2 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
3 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
4 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
5 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
6 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
7 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
8 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
9 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
652 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
10 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
11 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
12 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
13 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
14 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
15 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
16 |
于金霞, 廉欢欢, 汤永利, 等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018, 39(11): 91-101.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
17 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
18 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
19 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
20 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
21 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
{{custom_ref.label}} |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
/
〈 |
|
〉 |