Paper 2026/246

Highly Efficient and Round-Optimal Asymmetric PAKE

Zachary Barbanell, Oregon State University
Jiayu Xu, Oregon State University
Abstract

An asymmetric Password-Authenticated Key Exchange (aPAKE) protocol allows a client, who holds a raw password, and a server, who holds a one-way mapping of the password, to jointly establish a cryptographically strong session key, without an authenticated channel. The standard security definition for aPAKE is in the Universal Composability (UC) framework. Despite its great potential of being used in practice, existing aPAKE protocols are either not round-optimal, computationally inefficient, or not proven secure. In this work, we present two aPAKE protocols that are 1 simultaneous round, UC-secure, have reasonable computational costs, and rely on mild cryptographic assumptions. Our first protocol is in the Random Oracle Model and the Algebraic Group Model (ROM+AGM), secure under the CDH assumption, and has computational cost comparable to the most efficient aPAKE protocols in the literature (1 simultaneous round or not). Our second protocol is in the ROM only and secure under the DDH assumption, and also has significantly lower computational cost than the only other UC-secure 1 simultaneous round aPAKE protocol. Interestingly, even our second protocol does not rely on the gap Diffie-Hellman assumption, which requires creative application of the forking lemma.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
key exchangePAKE
Contact author(s)
barbanez @ oregonstate edu
xujiay @ oregonstate edu
History
2026-02-16: approved
2026-02-13: received
See all versions
Short URL
https://ia.cr/2026/246
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/246,
      author = {Zachary Barbanell and Jiayu Xu},
      title = {Highly Efficient and Round-Optimal Asymmetric {PAKE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/246},
      year = {2026},
      url = {https://eprint.iacr.org/2026/246}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.