메뉴 건너뛰기




Volumn 4117 LNCS, Issue , 2006, Pages 214-231

Tight bounds for unconditional authentication protocols in the manual channel and shared key models

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTATIONAL COMPLEXITY; ENTROPY; MATHEMATICAL MODELS; PROBABILITY; SECURITY SYSTEMS;

EID: 33749546005     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11818175_13     Document Type: Conference Paper
Times cited : (18)

References (20)
  • 1
    • 0036949106 scopus 로고    scopus 로고
    • Constant-round coin-tossing with a man in the middle or realizing the shared random string model
    • B. Barak. Constant-round coin-tossing with a man in the middle or realizing the shared random string model. In 43rd FOCS, pages 345-355, 2002.
    • (2002) 43rd FOCS , pp. 345-355
    • Barak, B.1
  • 2
    • 84941151742 scopus 로고    scopus 로고
    • Bluetooth. http://www.bluetooth.com/bluetooth/.
  • 4
    • 0031642212 scopus 로고    scopus 로고
    • Non-interactive and non-malleable commitment
    • G. Di Crescenzo, Y. Ishai, and R. Ostrovsky. Non-interactive and non-malleable commitment. In 30th STOC, pages 141-150, 1998.
    • (1998) 30th STOC , pp. 141-150
    • Di Crescenzo, G.1    Ishai, Y.2    Ostrovsky, R.3
  • 5
  • 7
    • 1842755386 scopus 로고
    • Cryptanalysis of the Gemmell and Naor multiround authentication protocol
    • C. Gehrmann. Cryptanalysis of the Gemmell and Naor multiround authentication protocol. In CRYPTO '94, pages 121-128, 1994.
    • (1994) CRYPTO '94 , pp. 121-128
    • Gehrmann, C.1
  • 9
    • 85013455236 scopus 로고
    • Codes for interactive authentication
    • P. Gemmell and M. Naor. Codes for interactive authentication. In CRYPTO '93, pages 355-367, 1993.
    • (1993) CRYPTO '93 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 11
    • 0024770898 scopus 로고
    • One-way functions are essential for complexity based cryptography
    • R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In 30th FOCS, pages 230-235, 1989.
    • (1989) 30th FOCS , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 12
    • 51249099680 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • S. Laur, N. Asokan, and K. Nyberg. Efficient mutual data authentication using manually authenticated strings. Cryptology ePrint Archive, Report 2005/424, 2005.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.424
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 13
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • U. M. Maurer. Authentication theory and hypothesis testing. IEEE Transactions on Information Theory, 46(4):1350-1356, 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 14
    • 33748605569 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • M. Naor and G. N. Rothblum. The complexity of online memory checking. In 46th FOCS, pages 573-584, 2005.
    • (2005) 46th FOCS , pp. 573-584
    • Naor, M.1    Rothblum, G.N.2
  • 15
    • 84941149826 scopus 로고    scopus 로고
    • Tight bounds for unconditional authentication protocols in the manual channel and shared key models
    • M. Naor, G. Segev, and A. Smith. Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Cryptology ePrint Archive, Report 2006/175, 2006.
    • (2006) Cryptology EPrint Archive, Report , vol.2006 , Issue.175
    • Naor, M.1    Segev, G.2    Smith, A.3
  • 16
    • 34848838622 scopus 로고    scopus 로고
    • New and improved constructions of non-malleable cryptographic protocols
    • R. Pass and A. Rosen. New and improved constructions of non-malleable cryptographic protocols. In 37th STOC, pages 533-542, 2005.
    • (2005) 37th STOC , pp. 533-542
    • Pass, R.1    Rosen, A.2
  • 17
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • G. J. Simmons. Authentication theory/coding theory. In CRYPTO '84, pages 411-431, 1984.
    • (1984) CRYPTO '84 , pp. 411-431
    • Simmons, G.J.1
  • 18
    • 85034654432 scopus 로고
    • The practice of authentication
    • G. J. Simmons. The practice of authentication. In EUROCRYPT '85, pages 261-272, 1985.
    • (1985) EUROCRYPT '85 , pp. 261-272
    • Simmons, G.J.1
  • 19
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In CRYPTO '05, pages 309-326, 2005.
    • (2005) CRYPTO '05 , pp. 309-326
    • Vaudenay, S.1
  • 20
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.