Netinfo Security ›› 2024, Vol. 24 ›› Issue (6): 937-947.doi: 10.3969/j.issn.1671-1122.2024.06.011

Previous Articles     Next Articles

Lattice-Based Round-Optimal Password Authenticated Secret Sharing Protocol

HU Chengcong1, HU Honggang1,2()   

  1. 1. School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230027, China
    2. Key Laboratory of Electromagnetic Space Information, Chinese Academy of Science, Hefei 230027, China
  • Received:2024-03-20 Online:2024-06-10 Published:2024-07-05

Abstract:

The combination of password authentication and secret sharing in Password-Protected Secret Sharing (PPSS) schemes presents a distributed solution that aligns with practical user needs. This protocol allows a user to share secrets among multiple servers, only requiring the memorization of a short password for subsequent simultaneous authentication and secret reconstruction. The security ensures that as long as the adversary does not corrupt servers beyond a threshold, it cannot reveal any information related to password or the secrets from the protocol.The PPSS schemes were initially based on discrete-log-hardness assumptions and their variants, making them vulnerable to quantum attacks. Finding a quantum-secure construction has thus become an urgent problem to address. Roy et al. introduced a quantum-secure construction against malicious adversaries, but its communication rounds are not optimal and even not be constant in the presence of malicious adversaries. Addressing the issue of optimizing protocol rounds, this paper firstly introduced a lattice-based quantum-secure construction with optimal rounds, using a Verifiable Oblivious Pseudorandom Function (V-OPRF) primitive and then rigorously proved security of the protocol. Furthermore, the protocol ensured that in scenarios with a majority of honest servers, an honest user will always successfully reconstruct the correct secret within the optimal number of rounds, demonstrating strong robustness.

Key words: password authentication, secret sharing, post-quantum cryptography, verifiable oblivious pseudorandom function

CLC Number: