Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
426600 | Information and Computation | 2008 | 22 Pages |
Abstract
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted third parties, but rather using a minimum of work by human user(s) implementing the low-band width unspoofable channels between them. We develop both pairwise and group protocols which are essentially optimal in human effort and, given that, computation. We compare our protocols with recent pairwise protocols proposed by, for example, Hoepman and Vaudenay. We introduce and analyse a new cryptographic primitive—a digest function—that is closely related to short-output universal hash functions.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics