Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment

نویسندگان

  • Jan Camenisch
  • Anja Lehmann
  • Anna Lysyanskaya
  • Gregory Neven
چکیده

Passwords are inherently vulnerable to dictionary attacks, but are quite secure if guessing attempts can beslowed down, for example by an online server. If this server gets compromised, however, the attacker can againperform an offline attack. The obvious remedy is to distribute the password verification process over multipleservers, so that the password remains secure as long as no more than a threshold of the servers are compromised.By letting these servers additionally host shares of a strong secret that the user can recover upon entering the cor-rect password, the user can perform further cryptographic tasks using this strong secret as a key, e.g., encryptingdata in the cloud. Threshold password-authenticated secret sharing (TPASS) protocols provide exactly this func-tionality, but the two only known schemes by Bagherzandi et al. (CCS 2011) and Camenisch et al. (CCS 2012)leak the password if a user mistakenly executes the protocol with malicious servers. Authenticating to the wrongservers is a common scenario when users are tricked in phishing attacks. We propose the first t-out-of-n TPASSprotocol for any n > t that does not suffer from this shortcoming. We prove our protocol secure in the UC frame-work, which for the particular case of password-based protocols offers important advantages over property-baseddefinitions, e.g., by correctly modeling typos in password attempts.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards the Quantification of Strategy Leakage

This paper reports first steps towards a formal model for strategy leakage. We generalize the representation of prior adversarial knowledge from a distribution on secrets to a distribution on strategies for generating secrets, which we call an environment. Applying information-theoretic techniques to environments allows us to disentangle the information leakage about a secret from the leakage a...

متن کامل

Secrets of Light in Traditional Houses of Iran

In addition to attention to natural light as a renewable, costless and environment-friendly source of energy in the late 20th century, numerous studies have been conducted into the effect of natural light on human being’s soul and body and all such studies reiterate the undeniable role of natural lighting on people’s behavior, attitudes, and efficiency. However, in spite of the awareness of the...

متن کامل

Secure Sketch for Multiple Secrets

Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from biometric data are seldom used alone, but typically employed in a multi-factor or a multimodality setting where multiple secrets with different roles and limitations are used together. To handle multiple secrets, we ...

متن کامل

مدیر موفق کیست؟

Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014