International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey

Authors:
Long Hoang Nguyen
Andrew William Roscoe
Download:
URL: http://eprint.iacr.org/2010/206
Search ePrint
Search Google
Abstract: One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public Key Infrastructure. An approach studied by a number of researchers is building security though human work creating a low-bandwidth empirical (or authentication) channel where the transmitted information is authentic and cannot be faked or modified. In this paper, we give an analytical survey of authentication protocols of this type. We start with non-interactive authentication schemes, and then move on to analyse a number of strategies used to build interactive pair-wise and group protocols that minimise the human work relative to the amount of security obtained as well as optimising the computation processing. In studying these protocols, we will discover that their security is underlined by the idea of commitment before knowledge, which is refined by two protocol design principles introduced in this survey.
BibTeX
@misc{eprint-2010-23107,
  title={Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / Authentication protocol using human interactions},
  url={http://eprint.iacr.org/2010/206},
  note={This is the extended version of a paper which has been accepted and is going to appear on Journal of Computer Security long.nguyen@comlab.ox.ac.uk 14713 received 14 Apr 2010},
  author={Long Hoang Nguyen and Andrew William Roscoe},
  year=2010
}