User-aided data authentication

نویسندگان

  • Sven Laur
  • Sylvain Pasini
چکیده

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreement protocols. In particular, we give a unified treatment of many previous results and outline common design principles. We also show that certain properties of user-aided protocols simplify the security analysis in complex environments compared to the standard authentication

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...

متن کامل

A Computer Aided Design of a Secure Registration Protocol

We use the formal language LOTOS to specify a registration protocol between a user and a Trusted Third Party that requires mutual authentication We explain how a model based veri cation method can be used to verify its ro bustness to attacks by an intruder This method is also used to nd a simpler protocol that remains secure

متن کامل

Role-based viewing envelopes for information protection in collaborative modeling

Information security and assurance are new frontiers for collaborative design. In this context, information assurance (IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJSN

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009