1 of 14

Lec 14: PAKE Based on SPHF

2 of 14

Recap: SPHF

  •  

3 of 14

From SPHF to PAKE [KV11]

 

 

 

 

 

 

 

 

 

4 of 14

  • Everyone computes (the product of) 2 SPHF values
    • My hash key on (our password and) your ciphertext → can compute because I know my hash key
    • Your hash key on (our password and) my ciphertext → can compute because I know your projection key and witness (randomness) for my ciphertext

 

 

 

 

 

 

 

 

5 of 14

  •  

 

 

 

 

 

 

 

 

6 of 14

Game-based security proof [KV 11, Thm 1]

  •  

7 of 14

  •  

8 of 14

  •  

9 of 14

  •  

10 of 14

  •  

11 of 14

  •  

12 of 14

  •  

13 of 14

Discussion

  • Do not need statistical smoothness; can relax to “computational SPHF”
  • More discussion next time…

14 of 14

References

  • [KV11] Jonathan Katz and Vinod Vaikuntanathan. Round-Optimal Password-Based Authenticated Key Exchange. In TCC 2011.