메뉴 건너뛰기




Volumn 19, Issue 1, 2011, Pages 139-201

Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey

Author keywords

Authentic empirical channel; commitment schemes and digest functions

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTHENTICATION SCHEME; BUILDING SECURITY; COMMITMENT SCHEME; EMPIRICAL CHANNELS; GROUP PROTOCOLS; HIGH-BANDWIDTH NETWORKS; LOW-BANDWIDTH; NON-INTERACTIVE; PERVASIVE COMPUTING; PROTOCOL DESIGN; PUBLIC KEY INFRASTRUCTURE; SECURE COMMUNICATIONS;

EID: 79951833159     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0403     Document Type: Article
Times cited : (52)

References (57)
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Lecture Notes in Computer Science, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto 1993, Lecture Notes in Computer Science, Vol. 773, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg, 1993, pp. 232-249.
    • (1993) Advances in Cryptology - Crypto 1993 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84974696785 scopus 로고
    • On families of hash functions via geometric codes and concatenation
    • Lecture Notes in Computer Science, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg
    • J. Bierbrauer, T. Johansson, G.A. Kabatianskii and B.J.M. Smeets, On families of hash functions via geometric codes and concatenation, in: Advances in Cryptology - Crypto 1993, Lecture Notes in Computer Science, Vol. 773, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg, 1993, pp. 331- 342.
    • (1993) Advances in Cryptology - Crypto 1993 , vol.773 , pp. 331-342
    • Bierbrauer, J.1    Johansson, T.2    Kabatianskii, G.A.3    Smeets, B.J.M.4
  • 4
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • DOI 10.1109/JPROC.2005.862475
    • M. Čagalj, S. Čapkun and J. Hubaux, Key agreement in peer-to-peer wireless networks, in: Proceedings of the IEEE Special Issue on Security and Cryptography, Vol. 94, A. Mazzeo, ed., IEEE, Washington, DC, USA, 2006, pp. 467-478. (Pubitemid 43145998)
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 467-478
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 6
    • 2342617507 scopus 로고    scopus 로고
    • Secret-ballot receipts: True voter-verifiable elections
    • D. Chaum, Secret-ballot receipts: true voter-verifiable elections, Security and Privacy Magazine, IEEE 2(1) (2004), 38-47.
    • (2004) Security and Privacy Magazine, IEEE , vol.2 , Issue.1 , pp. 38-47
    • Chaum, D.1
  • 9
    • 24644483295 scopus 로고    scopus 로고
    • Exploiting empirical engagement in authentication protocol design
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • S.J. Creese, M.H. Goldsmith, R. Harrison, A.W. Roscoe, P. Whittaker and I. Zakiuddin, Exploiting empirical engagement in authentication protocol design, in: Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005), Lecture Notes in Computer Science, Vol. 3450, D. Hutter and M. Ullmann, eds, Springer-Verlag, Berlin/Heidelberg, 2005, pp. 119-133. (Pubitemid 41274198)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 119-133
    • Creese, S.1    Goldsmith, M.2    Harrison, R.3    Roscoe, B.4    Whittaker, P.5    Zakiuddin, I.6
  • 10
    • 33751023842 scopus 로고    scopus 로고
    • Bootstrapping multi-party ad-hoc security
    • Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe and M. Xiao, Bootstrapping multi-party ad-hoc security, in: Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France, H.M. Haddad, ed., 2006, pp. 369-375. (Pubitemid 44758807)
    • (2006) Proceedings of the ACM Symposium on Applied Computing , vol.1 , pp. 369-375
    • Creese, S.1    Goldsmith, M.2    Roscoe, B.3    Xiao, M.4
  • 11
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. Mitchell and K. Nyberg, Manual authentication for wireless devices, RSA Cryptobytes 7(1) (2004), 29-37.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 12
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • C.J. Mitchell, ed., IEEE London
    • C. Gehrmann and K. Nyberg, Security in personal area networks, in: Security for Mobility, C.J. Mitchell, ed., IEEE, London, 2004, pp. 191-230.
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 14
    • 24644472550 scopus 로고    scopus 로고
    • Ephemeral pairing on anonymous networks
    • Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
    • J.-H. Hoepman, Ephemeral pairing on anonymous networks, in: Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005), Lecture Notes in Computer Science, Vol. 3450, D. Hutter and M. Ullmann, eds, Springer-Verlag, Berlin/Heidelberg, 2005, pp. 101- 116. (Pubitemid 41274196)
    • (2005) Lecture Notes in Computer Science , vol.3450 , pp. 101-116
    • Hoepman, J.-H.1
  • 15
    • 34247333484 scopus 로고    scopus 로고
    • Ephemeral pairing problem
    • Lecture Notes in Computer Science, A. Juels, ed., Springer-Verlag, Berlin/Heidelberg
    • J.-H. Hoepman, Ephemeral pairing problem, in: Proceeding of the 8th International Conference on Financial Cryptography, Lecture Notes in Computer Science, Vol. 3110, A. Juels, ed., Springer- Verlag, Berlin/Heidelberg, 2004, pp. 212-226.
    • (2004) Proceeding of the 8th International Conference on Financial Cryptography , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 16
    • 79951826127 scopus 로고    scopus 로고
    • http://www.prismmodelchecker.org/.
  • 17
    • 79951839096 scopus 로고    scopus 로고
    • ISO/IEC 9798-6, C. Mitchell, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
    • ISO/IEC 9798-6, C. Mitchell, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer, 2003.
    • (2003)
  • 18
    • 79951819872 scopus 로고    scopus 로고
    • ISO/IEC 9798-6 (revision), L.H. Nguyen, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
    • ISO/IEC 9798-6 (revision), L.H. Nguyen, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer, 2010.
    • (2010)
  • 19
    • 0030106709 scopus 로고    scopus 로고
    • On the cardinality of systematic authentication codes via error-correcting codes
    • G.A. Kabatianskii, B. Smeets and T. Johansson, On the cardinality of systematic authentication codes via error-correcting codes, IEEE Transactions on Information Theory 42(2) (1996), 566-578. (Pubitemid 126770509)
    • (1996) IEEE Transactions on Information Theory , vol.42 , Issue.2 , pp. 566-578
    • Kabatianskii, G.A.1    Smects, B.2    Johansson, T.3
  • 20
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Lecture Notes in Computer Science, Y. Desmedt, ed., Springer-Verlag, Berlin/Heidelberg
    • H. Krawczyk, LFSR-based hashing and authentication, in: Advances in Cryptology - Crypto 1994, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, ed., Springer-Verlag, Berlin/Heidelberg, 1994, pp. 129-139.
    • (1994) Advances in Cryptology - Crypto 1994 , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 21
    • 84957367286 scopus 로고
    • New hash functions for message authentication
    • Lecture Notes in Computer Science, L.C. Guillou and J.-J. Quisquater, eds, Springer-Verlag, Berlin/Heidelberg
    • H. Krawczyk, New hash functions for message authentication, in: Advances in Cryptology - Eurocrypt 1995, Lecture Notes in Computer Science, Vol. 921, L.C. Guillou and J.-J. Quisquater, eds, Springer-Verlag, Berlin/Heidelberg, 1995, pp. 301-310.
    • (1995) Advances in Cryptology - Eurocrypt 1995 , vol.921 , pp. 301-310
    • Krawczyk, H.1
  • 22
    • 79951838481 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings: Extended version, Report 2005/424, Cryptology ePrint Archive
    • S. Laur, N. Asokan and K. Nyberg, Efficient mutual data authentication using manually authenticated strings: Extended version, Report 2005/424, Cryptology ePrint Archive, 2006.
    • (2006)
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 23
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • Lecture Notes in Computer Science, D. Pointcheval, ed., Springer-Verlag, Berlin/Heidelberg
    • S. Laur and K. Nyberg, Efficient mutual data authentication using manually authenticated strings, in: Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006), Lecture Notes in Computer Science, Vol. 4301, D. Pointcheval, ed., Springer-Verlag, Berlin/Heidelberg, 2006, pp. 90-107.
    • (2006) Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006) , vol.4301 , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 24
    • 67650132615 scopus 로고    scopus 로고
    • Comparison-based key exchange and the security of the numeric comparison mode in Bluetooth v2.1
    • Lecture Notes in Computer Science, M. Fischlin, ed., Springer-Verlag, Berlin/Heidelberg
    • A.Y. Lindell, Comparison-based key exchange and the security of the numeric comparison mode in Bluetooth v2.1, in: Proceedings of the Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, Lecture Notes in Computer Science, Vol. 5473, M. Fischlin, ed., Springer- Verlag, Berlin/Heidelberg, 2009, pp. 66-83.
    • (2009) Proceedings of the Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology , vol.5473 , pp. 66-83
    • Lindell, A.Y.1
  • 27
    • 34648828586 scopus 로고    scopus 로고
    • Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions
    • DOI 10.1049/iet-ifs:20060131
    • A. Mashatan and D.R. Stinson, Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions, IET Information Security 1(3) (2007), 111-118. (Pubitemid 47460143)
    • (2007) IET Information Security , vol.1 , Issue.3 , pp. 111-118
    • Mashatan, A.1    Stinson, D.R.2
  • 33
    • 40149095729 scopus 로고    scopus 로고
    • Authenticating ad-hoc networks by comparison of short digests
    • L.H. Nguyen and A.W. Roscoe, Authenticating ad-hoc networks by comparison of short digests, Information and Computation 206(2-4) (2008), 250-271.
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 250-271
    • Nguyen, L.H.1    Roscoe, A.W.2
  • 34
    • 79951825464 scopus 로고    scopus 로고
    • New combinatorial bounds for universal families of hash functions, Report 2009/153, Cryptology ePrint Archive
    • L.H. Nguyen and A.W. Roscoe, New combinatorial bounds for universal families of hash functions, Report 2009/153, Cryptology ePrint Archive, 2009.
    • (2009)
    • Nguyen, L.H.1    Roscoe, A.W.2
  • 45
    • 60149100977 scopus 로고    scopus 로고
    • Bluetooth Special Interest Group available at:
    • Simple Pairing Whitepaper, Bluetooth Special Interest Group, 2006, available at: www. bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6- F2CCFA26F70F/0/SimplePairing-WP-V10r00.pdf.
    • (2006) Simple Pairing Whitepaper
  • 47
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Lecture Notes in Computer Science, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg
    • F. Stajano and R. Anderson, The resurrecting duckling: Security issues for ad-hoc wireless networks, in: Proceedings of the 7th InternationalWorkshop on Security Protocols, Lecture Notes in Computer Science, Vol. 1796, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg, 1999, pp. 172-194.
    • (1999) Proceedings of the 7th InternationalWorkshop on Security Protocols , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 48
    • 84947916257 scopus 로고    scopus 로고
    • The cocaine auction protocol: on the power of anonymous broadcast
    • Lecture Notes in Computer Science, A. Pfitzmann, ed., Springer-, A. Pfitzmann, ed., Springer-Verlag, Berlin/Heidelberg
    • F. Stajano and R. Anderson, The cocaine auction protocol: on the power of anonymous broadcast, in: Proceedings of the 3rd International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1768, A. Pfitzmann, ed., Springer-Verlag, Berlin/Heidelberg, 2000, pp. 434-447.
    • (2000) Proceedings of the 3rd International Workshop on Information Hiding , vol.1768 , pp. 434-447
    • Stajano, F.1    Anderson, R.2
  • 49
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Lecture Notes in Computer Science, J. Feigenbaum, ed., Springer-Verlag, Berlin/Heidelberg
    • D.R. Stinson, Universal hashing and authentication codes, in: Advances in Cryptology - Crypto 1991, Lecture Notes in Computer Science, Vol. 576, J. Feigenbaum, ed., Springer-Verlag, Berlin/Heidelberg, 1992, pp. 74-85.
    • (1992) Advances in Cryptology - Crypto 1991 , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 50
    • 38149072454 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Lecture Notes in Computer Science, F. Stajano, C. Meadows, S. Capkun and T. Moore, eds, Springer-Verlag, Berlin/Heidelberg
    • J. Suomalainen, J. Valkonen and N. Asokan, Security associations in personal networks: A comparative analysis, in: Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks 2007, Lecture Notes in Computer Science, Vol. 4572, F. Stajano, C. Meadows, S. Capkun and T. Moore, eds, Springer-Verlag, Berlin/Heidelberg, 2007, pp. 43-57.
    • (2007) Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks 2007 , vol.4572 , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 52
    • 84876402257 scopus 로고    scopus 로고
    • Ad-hoc security associations for groups
    • Lecture Notes in Computer ScienceK., L. Butty, V.D. Gligor and D.Westhoff, eds, Springer-Verlag, Berlin/Heidelberg
    • J. Valkonen, N. Asokan and K. Nyberg, Ad-hoc security associations for groups, in: Proceedings of the 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, Lecture Notes in Computer Science, Vol. 4357, L. Butty, V.D. Gligor and D.Westhoff, eds, Springer-Verlag, Berlin/Heidelberg, 2006, pp. 150-164.
    • (2006) Proceedings of the 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks , vol.4357 , pp. 150-164
    • Valkonen, J.1    Asokan, N.2    Nyberg, K.3
  • 54
    • 85020573990 scopus 로고
    • On the design of S-Boxes
    • Lecture Notes in Computer Science, S.E., H.C. Williams, ed., Springer-Verlag, Berlin/Heidelberg
    • A.F. Webster and S.E. Tavares, On the design of S-Boxes, in: Advances in Cryptology - Crypto 1985, Lecture Notes in Computer Science, Vol. 218, H.C. Williams, ed., Springer-Verlag, Berlin/Heidelberg, 1986, pp. 523-534.
    • (1986) Advances in Cryptology - Crypto 1985 , vol.218 , pp. 523-534
    • Webster, A.F.1    Tavares, S.E.2
  • 55
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • DOI 10.1016/0022-0000(81)90033-7
    • M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22(3) (1981), 265-279. (Pubitemid 12444638)
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman Mark, N.1    Carter J.Lawrence2
  • 56
    • 38149126229 scopus 로고    scopus 로고
    • Multi-channel protocols
    • Lecture Notes in Computer Science, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg
    • F.-L. Wong and F. Stajano, Multi-channel protocols, in: Proceedings of the 13th International Workshop on Security Protocols, Lecture Notes in Computer Science, Vol. 4631, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg, 2005, pp. 128-132.
    • (2005) Proceedings of the 13th International Workshop on Security Protocols , vol.4631 , pp. 128-132
    • Wong, F.-L.1    Stajano, F.2
  • 57
    • 35348851489 scopus 로고    scopus 로고
    • Multi-channel security protocols
    • F.-L. Wong and F. Stajano, Multi-channel security protocols, IEEE Pervasive Computing 6(4) (2007), 31-39.
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.4 , pp. 31-39
    • Wong, F.-L.1    Stajano, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.