2005
DOI: 10.1007/11535218_19
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communications over Insecure Channels Based on Short Authenticated Strings

Abstract: Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits. We call this SAS-based authentication as for authentication based on Short Authenticated Strings. The extra channel uses a weak notion of authentication in which strings cannot be forged nor modi£ed, but whose delivery can be maliciously stalled, canceled, or replayed. Our protocol is optimal and relies on an extractable or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
172
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 170 publications
(173 citation statements)
references
References 37 publications
1
172
0
Order By: Relevance
“…By comparing an SAS on an OOB channel, human users can authenticate information received from an insecure high bandwidth channel. Nguyen and Roscoe wrote an extensive survey [28] of HISPs, comparing their cost and efficiency, of which [30,32,33] are good examples.…”
Section: Choosing a Hispmentioning
confidence: 99%
“…By comparing an SAS on an OOB channel, human users can authenticate information received from an insecure high bandwidth channel. Nguyen and Roscoe wrote an extensive survey [28] of HISPs, comparing their cost and efficiency, of which [30,32,33] are good examples.…”
Section: Choosing a Hispmentioning
confidence: 99%
“…One proposal is the use of a narrowband authenticated channel, along with a broadband insecure channel, in order to achieve message authentication in such an environment has been investigated in several recent papers, see for example [GN04,MS09,SA99,Vau05]. In such solutions, the narrow-band channel is available all the time and can be used at least once for every message.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some protocols based on the Diffie-Hellman one were proposed [11,15] with an incomplete security analysis. A provably secure solution was finally proposed by Vaudenay [22]. This protocol can work with only 20 bits to authenticate and is based on a commitment scheme.…”
Section: Setting Up Secure Communicationsmentioning
confidence: 99%
“…We adapt the security model of [5,6] and [22]. We assume that the powerful adversary can launch instances of the preparing/repairing protocol on chosen inputs by making a chosen participant to play the (chosen) role of Alice or Bob with a chosen input.…”
Section: Adversarial Modelmentioning
confidence: 99%