2008
DOI: 10.1016/j.ic.2007.07.010
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating ad hoc networks by comparison of short digests

Abstract: We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-bandwidth unspoofable channels between them. We develop both pairwise and group protocols which are essentially optimal in human effort and, given that, computation. We compare our protocols with recent pairwise protocols proposed by, for example, Hoep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 30 publications
(45 citation statements)
references
References 26 publications
0
45
0
Order By: Relevance
“…The Symmetric HCBK (SHCBK) protocol [31] is a typical HISP. This, the general description, connects an arbitrary-sized group.…”
Section: Choosing a Hispmentioning
confidence: 99%
See 2 more Smart Citations
“…The Symmetric HCBK (SHCBK) protocol [31] is a typical HISP. This, the general description, connects an arbitrary-sized group.…”
Section: Choosing a Hispmentioning
confidence: 99%
“…The point is that by the time of this last publication, it was in fact committed to all the data used in the above protocol, even though it does not yet know all the hk A s. HCBK stands for Hash Commitment Before Knowledge. A careful security analysis of this protocol (see [31], for example) demonstrates that any attacker is unable to profit from combinatorial analysis aimed at getting the SASs (i.e. digests) to agree even though nodes have difference views of the authenticated information.…”
Section: Choosing a Hispmentioning
confidence: 99%
See 1 more Smart Citation
“…Such a case has been made in [14], in which it was argued that, in view of the large size of the input and the resulting performance impact on calculating its long hash or MAC output even when just a short output is really required, it is worthwhile to consider a digest function in which the computational complexity is quantifiably lower, if certain less stringent mathematical criteria are fulfilled.…”
Section: Separating the Requirements On The Pseudorandom Functionmentioning
confidence: 99%
“…, m n ) ∈ GF (2) n , R k is a b × n matrix with entries R i,j (k), which are independent Boolean valued random variables based on k ∈ GF (2) r . Although this is not defined explicitly in [14], we interpret it to mean: even if we know R i ,j (k) for all (i , j ) = (i 0 , j 0 ), we still have no information on the output of R i0,j0 (k), i.e.…”
Section: An Idealized Short Digestmentioning
confidence: 99%