Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3488932.3517389acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password

Published: 30 May 2022 Publication History

Abstract

Cloud storage is becoming increasingly popular among end users that outsource their personal data to services such as Dropbox or Google Drive. For security, uploaded data should ideally be encrypted under a key that is controlled and only known by the user. Current solutions that support user-centric encryption either require the user to manage strong cryptographic keys, or derive keys from weak passwords. While the former has massive usability issues and requires secure storage by the user, the latter approach is more convenient but offers only little security since encrypted data is susceptible to offline attacks. The recent concept of password-authenticated secret-sharing (PASS) enables users to securely derive strong keys from weak passwords by leveraging a distributed server setup, and has been considered a promising step towards secure and usable encryption. However, using PASS for encryption is not as suitable as originally thought: it only considers the (re)construction of a single, static key -- whereas practical encryption will require the management of many, object-specific keys. Using a dedicated PASS instance for every key makes the solution vulnerable against online attacks, inherently leaks access patterns to the servers and poses the risk of permanent data loss when an incorrect password is used at encryption. We therefore propose a new protocol that directly targets the problem of boostrapping encryption from a single password: distributed password-authenticated symmetric encryption DPaSE. DPaSE offers strong security and usability, such as protecting the user's password against online and offline attacks, and ensuring message privacy and ciphertext integrity as long as at least one server is honest. We formally define the desired security properties in the UC framework and propose a provably secure instantiation. The core of our protocol is a new type of Oblivious Pseudorandom Function (OPRF) that allows to extend a previous partially-blind query with a follow-up request and will be used to blindly carry over passwords across evaluations and avoid online attacks. Our (proof-of-concept) implementation of DPaSE uses 10 exponentiations at the user, 4 exponentiations and 2 pairings at each server, and has a server throughput of 76 account creations and 37 (user authentication followed by) encryptions per second, when run between a user and 2-10 servers.

Supplementary Material

MP4 File (ASIA-CCS22-fp116.mp4)
DPaSE proposes a new variant of a password-authenticated encryption scheme with the following properties: 1) many encryption keys from a single password 2) server does not learn the password 3) mitigation against offline/ online attacks, compromise of encryption keys 4) security in the concurrant setting. We define a new variant of OPRF, namely Extendable Distribiuted Partially Oblivious PRF (edpOPRF) as a building block for our DPaSE construction. Finally we provide practical evaluations of our DPaSE construction.

References

[1]
[n. d.]. DPaSE PoC Implementation. https://gitlab.com/DPaSEcode/dpase- submission-code.
[2]
[n. d.]. Internet Identity: The End of Usernames and Passwords. https://tinyurl. com/6rrhvzr2.
[3]
[n. d.]. MEGA: Secure Cloud Storage and Communication Privacy by Design. https://mega.nz/.
[4]
[n. d.]. Tresorit: Cloud Storage + End-to-end Encryption. https://tresorit.com/ security/encryption.
[5]
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, and Peter Rindal. 2018. DiSE: Distributed Symmetric-key Encryption. 1993--2010. https://doi.org/10.1145/3243734.3243774
[6]
Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, and Yanbin Lu. 2011. Password-protected secret sharing. 433--444. https://doi.org/10.1145/2046707.2046758
[7]
Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, and Avishay Yanai. 2020. PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server. IEEE European Symposium on Security and Privacy.
[8]
Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schrö der, and Markus Zoppelt. 2020. Threshold Password-Hardened Encryption Services. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3372297.3417266
[9]
Jan Camenisch and Anja Lehmann. 2017. Privacy-Preserving User-Auditable Pseudonym Systems. In 2017 IEEE European Symposium on Security and Privacy, Euro S&P. IEEE.
[10]
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, and Gregory Neven. 2014. Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment. 256--275. https://doi.org/10.1007/978-3-662-44381-1_15
[11]
Jan Camenisch, Anja Lehmann, and Gregory Neven. 2015. Optimal Distributed Password Verification. 182--194. https://doi.org/10.1145/2810103.2813722
[12]
Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. 136--145. https://doi.org/10.1109/SFCS.2001.959888
[13]
Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, and Rohit Sinha. 2021. Amortized Threshold Symmetric-key Encryption. In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Yongdae Kim, Jong Kim, Giovanni Vigna, and Elaine Shi (Eds.). https://doi.org/10.1145/3460120.3485256
[14]
Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, and Thomas Ristenpart. 2015. The Pythia PRF Service. 547--562.
[15]
Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
[16]
Stanislaw Jarecki, Aggelos Kiayias, and Hugo Krawczyk. 2014. Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. 233--253. https://doi.org/10.1007/978-3-662-45608-8_13
[17]
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, and Jiayu Xu. 2016. Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). In IEEE European Symposium on Security and Privacy, Euro S&P.
[18]
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, and Jiayu Xu. 2017. TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. 39--58. https://doi.org/10.1007/978-3-319-61204-1_3
[19]
Stanislaw Jarecki, Hugo Krawczyk, and Jason K. Resch. 2019. Updatable Oblivious Key Management for Storage Systems. 379--393. https://doi.org/10.1145/3319535.3363196
[20]
Stanislaw Jarecki, Hugo Krawczyk, and Jiayu Xu. 2018. OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. 456--486. https://doi.org/10.1007/978-3-319-78372-7_15
[21]
Stanislaw Jarecki and Xiaomin Liu. 2009. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. 577--594. https://doi.org/10.1007/978-3-642-00457-5_34
[22]
Michael Klooß, Anja Lehmann, and Andy Rupp. 2019. (R)CCA Secure Updatable Encryption with Integrity Protection. 68--99. https://doi.org/10.1007/978-3-030-17653-2_3
[23]
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. 2016. Efficient Batched Oblivious PRF with Applications to Private Set Intersection. 818--829. https://doi.org/10.1145/2976749.2978381
[24]
Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2018. Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. 297--314. https://doi.org/10.1109/SP.2018.00002
[25]
Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, and Dominique Schröder. 2018. Simple Password-Hardened Encryption Services. In 27th USENIX Security Symposium, USENIX Security. https://www.usenix.org/conference/usenixsecurity18/presentation/lai
[26]
Anja Lehmann. 2019. ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service. Proc. Priv. Enhancing Technol. (2019). https://doi.org/10.2478/popets-2019-0048
[27]
Anja Lehmann and Björn Tackmann. 2018. Updatable Encryption with Post-Compromise Security. 685--716. https://doi.org/10.1007/978-3-319-78372-7_22
[28]
Xunhua Wang and Ben Huson. 2020. Robust distributed symmetric-key encryption. IACR ePrint (2020).

Cited By

View all
  • (2024)Password-Protected Key Retrieval with(out) HSM ProtectionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690358(2445-2459)Online publication date: 2-Dec-2024
  • (2024)QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud StorageIEEE Transactions on Services Computing10.1109/TSC.2023.333100017:3(1140-1153)Online publication date: May-2024
  • (2024)QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud StorageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337280419(4231-4246)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
        May 2022
        1291 pages
        ISBN:9781450391405
        DOI:10.1145/3488932
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 May 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. cloud storage
        2. key management
        3. oblivious prf
        4. password-based authentication
        5. universal composition

        Qualifiers

        • Research-article

        Funding Sources

        • German Research Foundation DFG
        • EU Horizon 2020 research and innovation programme

        Conference

        ASIA CCS '22
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 418 of 2,322 submissions, 18%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)42
        • Downloads (Last 6 weeks)4
        Reflects downloads up to 16 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Password-Protected Key Retrieval with(out) HSM ProtectionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690358(2445-2459)Online publication date: 2-Dec-2024
        • (2024)QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud StorageIEEE Transactions on Services Computing10.1109/TSC.2023.333100017:3(1140-1153)Online publication date: May-2024
        • (2024)QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud StorageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337280419(4231-4246)Online publication date: 2024
        • (2024)Compact Key Storage in the Standard ModelTheory of Cryptography10.1007/978-3-031-78011-0_15(444-475)Online publication date: 2-Dec-2024
        • (2024)Compact Key StorageAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_3(75-109)Online publication date: 18-Aug-2024
        • (2024)A Formal Treatment of End-to-End Encrypted Cloud StorageAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_2(40-74)Online publication date: 18-Aug-2024
        • (2023)Progression Towards a Safer and Private Authorization for Business Entities: Fire OAuthProceedings of the International Conference on Emerging Trends in Business & Management (ICETBM 2023)10.2991/978-94-6463-162-3_22(243-257)Online publication date: 10-May-2023

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media