Identity Based (ID2S) Authenticated Exchange Protocols

Seelam Sowjanya, P Suresh Kumar
2018 IJSRST |   unpublished
In the two-server a key password-authenticated exchange (PAKE) protocol, a sender divides its password and stores into two shares of its association in the two servers, individually, and the two servers then progressing to authenticate the client without memorising the password of the client. And In case one server is distrusted by an opponent, the password of the user is asked to endure strong. The author introduces two compilers that transform any two-party PAKE protocol to a two-server PAKE
more » ... rotocol by the identity-based cryptography, called ID2S PAKE protocol. By the compilers, we can assemble ID2S PAKE protocols which achieve understood authentication. As long as the underlying two-party PAKE protocol and identity-based encryption or signature system have provable protection without casual oracles, the ID2S PAKE protocols constructed by the compilers can be proven to be secure without random oracles. Associated with the Katz et al.'s two-server PAKE protocol with provable security without random oracles, our ID2S PAKE protocol can save from 22% to 66% of computation in each server.
fatcat:u6fkb3ur3vhtdaj5iqak6gc4ie