2011
DOI: 10.1007/978-3-642-20465-4_15
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication from a Weak Key, without Leaking Information

Abstract: We study the problem of authentication based on a weak key in the informationtheoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. This problem has recently received considerable attention, with different solutions optimizing different parameters. We study the problem in an extended setting, where the weak key is a one-time session key that is derived from a public source of randomness with the help of a (potentially also weak) long-term key. Our goal now is to a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…This additional security condition was subsequently explored in the setting of interactive key agreement [7].…”
Section: Correctnessmentioning
confidence: 99%
“…This additional security condition was subsequently explored in the setting of interactive key agreement [7].…”
Section: Correctnessmentioning
confidence: 99%