2000
DOI: 10.1016/s0167-739x(99)00055-2
|View full text |Cite
|
Sign up to set email alerts
|

Protecting secret keys with personal entropy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2000
2000
2018
2018

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(50 citation statements)
references
References 2 publications
0
49
0
Order By: Relevance
“…Shannon's entropy [19], [20], [21] has been widely used in many disciplines, such as sensor networks [22], cryptography [23], and preference-based authentication [24]. Our quantifying activity fundamentally differs from the analysis by Jakobbson, Yang, and Wetzel on quantifying preferences [24], because of the diversity and dynamic-nature of personal activities in our model.…”
Section: Related Workmentioning
confidence: 98%
“…Shannon's entropy [19], [20], [21] has been widely used in many disciplines, such as sensor networks [22], cryptography [23], and preference-based authentication [24]. Our quantifying activity fundamentally differs from the analysis by Jakobbson, Yang, and Wetzel on quantifying preferences [24], because of the diversity and dynamic-nature of personal activities in our model.…”
Section: Related Workmentioning
confidence: 98%
“…Interestingly, the noisy polynomial interpolation and the polynomial reconstruction problems also appeared in password authentication schemes [25,13]. Both schemes use Shamir's secret sharing scheme based on Lagrange's polynomial interpolation, where the shares are encrypted with low entropy secrets.…”
Section: S3 S2mentioning
confidence: 99%
“…Shamir's scheme achieves perfect security, but here, additional information is available to the attacker. A closer inspection shows that [13] is based on the noisy polynomial interpolation problem, and is therefore insecure for many choices of the parameters. For instance, the authors propose to use n = 22, k = 14 and m ≈ 256 to protect a 112-bit key.…”
Section: S3 S2mentioning
confidence: 99%
“…Two recent papers that are related in a technical sense are those of Monrose, Reiter and Wetzel [23] who used similar methods for strengthening login sessions by measuring typing speeds; and Ellison, Hall, Milbert and Schneier [10], who suggested a method for "fuzzy" passphrase based logins, where only a certain portion of the passphrase needs to be correct. Whereas the former employs techniques believed to be resistant against lattice-based attacks (see e.g., [7,25,33]), the latter has been found to be susceptible to such attacks, as recently pointed out by Bleichenbacher [4].…”
Section: Overview Of Forensic Dna Techniques and Databasesmentioning
confidence: 99%