Cryptology ePrint Archive: Report 2009/150

Efficient group authentication protocols based on human interaction

Long Hoang Nguyen and A. W. Roscoe

Abstract: We re-examine the needs of computer security in pervasive computing from first principles, specifically the problem of bootstrapping secure networks. We consider the case of systems that may have no shared secret information, and where there is no structure such as a PKI available. We propose several protocols which achieve a high degree of security based on a combination of human-mediated communication and an ordinary Dolev-Yao communication medium. In particular they resist combinatorial attacks on the hash or digest values that have to be compared by human users, seemingly optimising the amount of security they can achieve for a given amount of human effort. We compare our protocols with recent pairwise protocols proposed by, for example, Hoepman and Vaudenay.

Category / Keywords: cryptographic protocols / Authentication protocol using human interactions

Publication Info: This paper has been accepted and published in the informal proceedings (page 931) of Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, August 2006

Date: received 1 Apr 2009, last revised 11 Dec 2011

Contact author: long nguyen at comlab ox ac uk

Available format(s): PDF | BibTeX Citation

Note: A preliminary version of this paper appeared in the informal proceedingds of the workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, pp. 9-31 (FCS-ARSPA 2006).

Version: 20111211:104748 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]