Identification Protocols Secure against Reset Attacks
نویسندگان
چکیده
We provide identification protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and when executed in an asynchronous environment like the Internet that gives the adversary concurrent access to instances of the user. These protocols are suitable for use by devices (like smartcards) which when under adversary control may not be able to reliably maintain their internal state between invocations.
منابع مشابه
An efficient identification protocol secure against concurrent-reset attacks
In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [2] which captures concurrent attacks and reset attacks. Then we propose an extremely simple identification protocol and prove that its CR2 security is equivalent to the hardness of the Strong Diffie-Hellman problem.
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملSurvey and New Idea for Attribute-Based Identification Scheme Secure against Reset Attacks
Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the otherhand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In thi...
متن کاملIdentiication Protocols Secure against Reset Attacks
We introduce new ID schemes that are secure even when (1) an adversary can reset the internal state and/or randomization source of the user identifying itself, and (2) when executed in an asynchronous environment like the Internet. Our new protocols and schemes are ideally suited for use by devices (like smart cards) that canot keep reliably their internal states between invocations.
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کامل