메뉴 건너뛰기




Volumn 6558 LNCS, Issue , 2011, Pages 284-301

Stronger difficulty notions for client puzzles and denial-of-service- resistant protocols

Author keywords

client puzzles; denial of service resistance; proof of work; protocols

Indexed keywords

CLIENT PUZZLES; COMPUTATIONAL POWER; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; DOS RESISTANCES; HARD PROBLEMS; PROOF OF WORK; PROTOCOLS; SECURITY MODEL;

EID: 79951798566     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19074-2_19     Document Type: Conference Paper
Times cited : (31)

References (35)
  • 3
    • 0005966913 scopus 로고    scopus 로고
    • Stateless connections
    • Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 87-97. Springer, Heidelberg (1997) (Pubitemid 127148037)
    • (1997) Lecture Notes in Computer Science , Issue.1334 , pp. 87-97
    • Aura, T.1    Nikander, P.2
  • 4
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Security Protocols
    • Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170-177. Springer, Heidelberg (2001) (Pubitemid 33347515)
    • (2001) Lecture Notes in Computer Science , Issue.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 7
    • 79951789641 scopus 로고    scopus 로고
    • Back, A.: Hashcash (2004), http://www.hashcash.org/docs/hashcash.html
    • (2004) Hashcash
    • Back, A.1
  • 8
    • 85032128552 scopus 로고    scopus 로고
    • Security of the cipher block chaining message authentication code
    • DOI 10.1006/jcss.1999.1694
    • Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362-399 (2000) (Pubitemid 32087266)
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 9
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R. (ed.) CRYPTO 1993 Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 85071440512 scopus 로고    scopus 로고
    • Halting password puzzles: Hard-to-break encryption from human-memorable keys
    • Boyen, X.: Halting password puzzles: Hard-to-break encryption from human-memorable keys. In: Proc. 16th USENIX Security Symposium, pp. 119-134 (2007)
    • (2007) Proc. 16th USENIX Security Symposium , pp. 119-134
    • Boyen, X.1
  • 12
    • 24144435673 scopus 로고    scopus 로고
    • Hardness amplification of weakly verifiable puzzles
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • Canetti, R., Halevi, S., Steiner, M.: Hardness amplification of weakly verifiable puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17-33. Springer, Heidelberg (2005) (Pubitemid 41231156)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 17-33
    • Canetti, R.1    Halevi, S.2    Steiner, M.3
  • 13
    • 72449146821 scopus 로고    scopus 로고
    • Security notions and generic constructions for client puzzles
    • Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
    • Chen, L., Morrissey, P., Smart, N.P., Warinschi, B.: Security notions and generic constructions for client puzzles. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 505-523. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 505-523
    • Chen, L.1    Morrissey, P.2    Smart, N.P.3    Warinschi, B.4
  • 14
    • 70350281850 scopus 로고    scopus 로고
    • Security amplification for interactive cryptographic primitives
    • Reingold, O. (ed.) TCC 2009 Springer, Heidelberg
    • Dodis, Y., Impagliazzo, R., Jaiswal, R., Kabanets, V.: Security amplification for interactive cryptographic primitives. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 128-145. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 128-145
    • Dodis, Y.1    Impagliazzo, R.2    Jaiswal, R.3    Kabanets, V.4
  • 16
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Brickell, E.F. (ed.) CRYPTO 1992 Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 18
    • 14844286782 scopus 로고    scopus 로고
    • Proofs of work and bread pudding protocols (extended abstract)
    • Preneel, B. (ed.) Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security Kluwer, Dordrecht
    • Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols (extended abstract). In: Preneel, B. (ed.) Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. IFIP Conference Proceedings, vol. 152, pp. 258-272. Kluwer, Dordrecht (1999), http://www.rsa.com/rsalabs/node.aspid=2049
    • (1999) IFIP Conference Proceedings , vol.152 , pp. 258-272
    • Jakobsson, M.1    Juels, A.2
  • 19
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • Internet Society, San Diego
    • Juels, A., Brainard, J.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: Proc. Internet Society Network and Distributed System Security Symposium (NDSS) 1999, pp. 151-165. Internet Society, San Diego (1999)
    • (1999) Proc. Internet Society Network and Distributed System Security Symposium (NDSS) , vol.1999 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 20
    • 78049359365 scopus 로고    scopus 로고
    • Low-cost client puzzles based on modular exponentiation
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010 Springer, Heidelberg
    • Karame, G.O., Capkun, S.: Low-cost client puzzles based on modular exponentiation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 679-697. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 679-697
    • Karame, G.O.1    Capkun, S.2
  • 21
    • 33746646599 scopus 로고    scopus 로고
    • Internet Key Exchange (IKEv2) protocol
    • Kaufman, C.: Internet Key Exchange (IKEv2) protocol, RFC 4306 (2005)
    • (2005) RFC 4306
    • Kaufman, C.1
  • 22
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007 Springer, Heidelberg
    • LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • Lamacchia, B.1    Lauter, K.2    Mityagin, A.3
  • 24
    • 79951789972 scopus 로고    scopus 로고
    • PTCP: A client puzzle protocol for defending against resource exhaustion denial of service attacks
    • Department of Electrical and Computer Engineering, Virginia Tech
    • McNevin, T.J., Park, J.M., Marchany, R.: pTCP: A client puzzle protocol for defending against resource exhaustion denial of service attacks. Technical Report TR-ECE-04-10, Department of Electrical and Computer Engineering, Virginia Tech (2004), http://www.arias.ece.vt.edu/publications/TechReports/ mcNevin-2004-1.pdf
    • (2004) Technical Report TR-ECE-04-10
    • McNevin, T.J.1    Park, J.M.2    Marchany, R.3
  • 25
    • 0032664157 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • IEEE, Los Alamitos
    • Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proc. 12th IEEE Computer Security Foundations Workshop (CSFW), p. 4. IEEE, Los Alamitos (1999)
    • (1999) Proc. 12th IEEE Computer Security Foundations Workshop (CSFW) , pp. 4
    • Meadows, C.1
  • 27
    • 84979076059 scopus 로고    scopus 로고
    • PayWord and MicroMint: Two simple micropay-ment schemes
    • Lomas, M. (ed.) Security Protocols 1996 Springer, Heidelberg
    • Rivest, R.L., Shamir, A.: PayWord and MicroMint: Two simple micropay-ment schemes. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 69-87. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1189 , pp. 69-87
    • Rivest, R.L.1    Shamir, A.2
  • 28
    • 0010602889 scopus 로고    scopus 로고
    • Time-lock puzzles and timed-release crypto
    • MIT Laboratory for Computer Science
    • Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Tech. Rep. TR-684, MIT Laboratory for Computer Science (1996), http://people.csail.mit.edu/rivest/RivestShamirWagner-timelock.pdf
    • (1996) Tech. Rep. TR-684
    • Rivest, R.L.1    Shamir, A.2    Wagner, D.A.3
  • 29
    • 84872811083 scopus 로고    scopus 로고
    • Modelling denial of service attacks on JFK with Meadows's cost-based framework
    • Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) Proc. 4th Australasian Information Security Workshop - Network Security (AISW-NetSec) 2006 Australian Computer Society
    • Smith, J., Gonźalez Nieto, J., Boyd, C.: Modelling denial of service attacks on JFK with Meadows's cost-based framework. In: Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) Proc. 4th Australasian Information Security Workshop - Network Security (AISW-NetSec) 2006. CRPIT, vol. 54, pp. 125-134. Australian Computer Society (2006)
    • (2006) CRPIT , vol.54 , pp. 125-134
    • Smith, J.1    Gonźalez Nieto, J.2    Boyd, C.3
  • 30
    • 79951802751 scopus 로고    scopus 로고
    • Stronger difficulty notions for client puzzles and denial-of-service- resistant protocols
    • full version
    • Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C., Gonzalez Nieto, J.: Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. Cryp-tology ePrint Archive (2010) (full version), http://eprint.iacr.org/
    • (2010) Cryp-tology EPrint Archive
    • Stebila, D.1    Kuppusamy, L.2    Rangasamy, J.3    Boyd, C.4    Gonzalez Nieto, J.5
  • 31
    • 70350639691 scopus 로고    scopus 로고
    • Towards denial-of-service-resilient key agreement protocols
    • Boyd, C., Gonźalez Nieto, J. (eds.) ACISP 2009 Springer, Heidelberg
    • Stebila, D., Ustaoglu, B.: Towards denial-of-service-resilient key agreement protocols. In: Boyd, C., Gonźalez Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 389-406. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5594 , pp. 389-406
    • Stebila, D.1    Ustaoglu, B.2
  • 32
    • 80052378761 scopus 로고    scopus 로고
    • Cryptography: Theory and practice
    • 2nd edn Chapman & Hall
    • Stinson, D.R.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall, Boca Raton (2002)
    • (2002) Boca Raton
    • Stinson, D.R.1
  • 33
    • 38349080863 scopus 로고    scopus 로고
    • Toward non-parallelizable client puzzles
    • Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007 Springer, Heidelberg
    • Tritilanunt, S., Boyd, C., Foo, E., Gonźalez Nieto, J.: Toward non-parallelizable client puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 247-264. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4856 , pp. 247-264
    • Tritilanunt, S.1    Boyd, C.2    Foo, E.3    Gonźalez Nieto, J.4
  • 34
    • 38649136602 scopus 로고    scopus 로고
    • Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
    • Ustaoglu, B.: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. Designs, Codes and Cryptography 46(3), 329-342 (2008)
    • (2008) Designs, Codes and Cryptography , vol.46 , Issue.3 , pp. 329-342
    • Ustaoglu, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.