메뉴 건너뛰기




Volumn 23, Issue 3, 2010, Pages 402-421

Parallel and concurrent security of the HB and HB + protocols

Author keywords

Authentication protocols; Learning parity with noise; RFID

Indexed keywords

ACTIVE ATTACK; AUTHENTICATION PROTOCOLS; BINARY LINEAR CODES; COMPUTATIONAL COSTS; KEY AUTHENTICATION; LEARNING PARITY WITH NOISE; LOW-COST DEVICES; RADIOFREQUENCY IDENTIFICATION TAGS;

EID: 77954759293     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-010-9061-2     Document Type: Article
Times cited : (63)

References (38)
  • 3
    • 84877639283 scopus 로고
    • Cryptographic primitives based on hard learning problems
    • LNCS, (Springer, Berlin)
    • A. Blum, M. Furst, M. Kearns, R. Lipton, Cryptographic primitives based on hard learning problems, in Adv. in Cryptology-Crypto'93. LNCS, vol. 773 (Springer, Berlin, 1994), pp. 278-291.
    • (1994) Adv. in Cryptology-Crypto'93 , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.2    Kearns, M.3    Lipton, R.4
  • 4
    • 24144453496 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • A. Blum, A. Kalai, H. Wasserman, Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003).
    • (2003) J. ACM , vol.50 , Issue.4 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 5
    • 33845920117 scopus 로고    scopus 로고
    • ++: A lightweight authentication protocol secure against some attacks
    • ed. by P. Georgiadis, J. Lopez, S. Gritzalis, G. Marias (IEEE Computer Society Press, Los Alamitos)
    • ++: A lightweight authentication protocol secure against some attacks, in Proceedings of SecPerU 2006, ed. by P. Georgiadis, J. Lopez, S. Gritzalis, G. Marias (IEEE Computer Society Press, Los Alamitos, 2006), pp. 28-33.
    • (2006) Proceedings of SecPerU 2006 , pp. 28-33
    • Bringer, J.1    Chabanne, H.2    Dottax, E.3
  • 6
    • 0037605775 scopus 로고    scopus 로고
    • Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds
    • R. Canetti, J. Kilian, E. Petrank, A. Rosen, Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds. SIAM J. Comput. 32(1), 1-47 (2002).
    • (2002) SIAM J. Comput. , vol.32 , Issue.1 , pp. 1-47
    • Canetti, R.1    Kilian, J.2    Petrank, E.3    Rosen, A.4
  • 8
    • 84948963042 scopus 로고
    • On the security of some cryptosystems based on error-correcting codes
    • LNCS, (Springer, Berlin)
    • F. Chabaud, On the security of some cryptosystems based on error-correcting codes, in Adv. in Cryptology-Eurocrypt '94. LNCS, vol. 950 (Springer, Berlin, 1995), pp. 131-139.
    • (1995) Adv. in Cryptology-Eurocrypt '94 , vol.950 , pp. 131-139
    • Chabaud, F.1
  • 10
    • 0024984004 scopus 로고
    • Witness indistinguishability and witness hiding protocols
    • ACM, New York
    • U. Feige, A. Shamir, Witness indistinguishability and witness hiding protocols, in 22nd ACM Symposium on Theory of Computing (ACM, New York, 1990), pp. 416-426.
    • (1990) 22nd ACM Symposium on Theory of Computing , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 11
    • 84998808084 scopus 로고    scopus 로고
    • An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
    • LNCS, (Springer, Berlin)
    • M. Fossorier, M.J.Mihaljevic, H. Imai, Y. Cui, K.Matsuura, An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication, in Progress in Cryptology-INDOCRYPT 2006. LNCS, vol. 4329 (Springer, Berlin, 2006), pp. 48-62.
    • (2006) Progress in Cryptology-INDOCRYPT 2006 , vol.4329 , pp. 48-62
    • Fossorier, M.1    Mihaljevic, M.J.2    Imai, H.3    Cui, Y.4    Matsuura, K.5
  • 12
    • 27644472569 scopus 로고    scopus 로고
    • +: A provably secure lightweight authentication protocol
    • +: A provably secure lightweight authentication protocol. IEE Electron. Lett. 41(21), 1169-1170 (2005).
    • (2005) IEE Electron. Lett. , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Silbert, H.3
  • 16
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • O. Goldreich, H. Krawczyk, On the composition of zero-knowledge proof systems. SIAM J. Comput. 25(1), 169-192 (1996).
    • (1996) SIAM J. Comput. , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 17
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • O. Goldreich, Y. Oren, Definitions and properties of zero-knowledge proof systems. J. Cryptol. 7(1), 1-32 (1994).
    • (1994) J. Cryptol. , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 20
    • 0000844603 scopus 로고    scopus 로고
    • Some optimal inapproximability results
    • J. Håstad, Some optimal inapproximability results. J. ACM 48(4), 798-859 (2001).
    • (2001) J. ACM , vol.48 , Issue.4 , pp. 798-859
    • Håstad, J.1
  • 22
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • LNCS, (Springer, Berlin)
    • N. Hopper, M. Blum, Secure human identification protocols, in Adv. in Cryptology-Asiacrypt 2001. LNCS, vol. 2248 (Springer, Berlin, 2001), pp. 52-66.
    • (2001) Adv. in Cryptology-Asiacrypt 2001 , vol.2248 , pp. 52-66
    • Hopper, N.1    Blum, M.2
  • 23
    • 0001336166 scopus 로고
    • A new upper bound for error-correcting codes
    • S.M. Johnson, A new upper bound for error-correcting codes. IRE Trans. Inf. Theory 8(3), 203-207 (1962).
    • (1962) IRE Trans. Inf. Theory , vol.8 , Issue.3 , pp. 203-207
    • Johnson, S.M.1
  • 24
    • 0005861105 scopus 로고
    • Improved asymptotic bounds for error-correcting codes
    • S.M. Johnson, Improved asymptotic bounds for error-correcting codes. IEEE Trans. Inf. Theory 9(3), 198-205 (1963).
    • (1963) IEEE Trans. Inf. Theory , vol.9 , Issue.3 , pp. 198-205
    • Johnson, S.M.1
  • 25
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • LNCS, (Springer, Berlin), Updated version available at
    • A. Juels, S. Weis, Authenticating pervasive devices with human protocols, in Adv. in Cryptology-Crypto 2005. LNCS, vol. 3621 (Springer, Berlin, 2005), pp. 293-308. Updated version available at: http://www.rsasecurity.com/rsalabs/ staff/bios/ajuels/publications/pdfs/lpn.pdf.
    • (2005) Adv. in Cryptology-Crypto 2005 , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 28
    • 0032202014 scopus 로고    scopus 로고
    • Efficient noise-tolerant learning from statistical queries
    • M. Kearns, Efficient noise-tolerant learning from statistical queries. J. ACM 45(6), 983-1006 (1998).
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 983-1006
    • Kearns, M.1
  • 32
    • 26944487960 scopus 로고    scopus 로고
    • The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem
    • LNCS, (Springer, Berlin)
    • V. Lyubashevsky, The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem, in 9th Intl. Workshop on Randomization and Computation (RANDOM 2005). LNCS, vol. 3624 (Springer, Berlin, 2005), pp. 378-389.
    • (2005) 9th Intl. Workshop on Randomization and Computation (RANDOM 2005) , vol.3624 , pp. 378-389
    • Lyubashevsky, V.1
  • 33
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A further step in the hb-family of lightweight authentication protocols
    • J. Munilla, A. Peinado, HB-MP: A further step in the hb-family of lightweight authentication protocols. Comput. Netw. 51, 2262-2267 (2007).
    • (2007) Comput. Netw. , vol.51 , pp. 2262-2267
    • Munilla, J.1    Peinado, A.2
  • 34
    • 35448969719 scopus 로고    scopus 로고
    • An efficient parallel repetition theorem for Arthur-Merlin games
    • ACM, New York
    • R. Pass, M. Venkitasubramaniam, An efficient parallel repetition theorem for Arthur-Merlin games, in 39th ACM Symposium on Theory of Computing (ACM, New York, 2007), pp. 420-429.
    • (2007) 39th ACM Symposium on Theory of Computing , pp. 420-429
    • Pass, R.1    Venkitasubramaniam, M.2
  • 35
    • 70350642078 scopus 로고    scopus 로고
    • Public-key cryptosystems from the worst-case shortest vector problem
    • ACM, New York
    • C. Peikert, Public-key cryptosystems from the worst-case shortest vector problem, in 41st ACM Symposium on Theory of Computing (ACM, New York, 2009), pp. 333-342.
    • (2009) 41st ACM Symposium on Theory of Computing , pp. 333-342
    • Peikert, C.1
  • 36
    • 0001226672 scopus 로고    scopus 로고
    • A parallel repetition theorem
    • R. Raz, A parallel repetition theorem. SIAM J. Comput. 27(3), 763-803 (1998).
    • (1998) SIAM J. Comput. , vol.27 , Issue.3 , pp. 763-803
    • Raz, R.1
  • 37
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • ACM, New York
    • O. Regev, On lattices, learning with errors, random linear codes, and cryptography, in 37th ACM Symposium on Theory of Computing (ACM, New York, 2005), pp. 84-93.
    • (2005) 37th ACM Symposium on Theory of Computing , pp. 84-93
    • Regev, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.