User-Aided Data Authentication

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic Out-Of-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreement protocols. In particular, we give a unified treatment of many previous results and outline common design principles. We also show that certain properties of user-aided protocols simplify the security analysis in complex environments compared to the standard authentication protocols.


Published in:
International Journal of Security and Networks, 4, 1, 69-86
Year:
2009
Keywords:
Note:
The article can be found here: http://www.inderscience.com/search/index.php? action=record&rec_id=23427&prevQuery=&ps=10&m=or
Laboratories:




 Record created 2009-04-23, last modified 2018-03-17

n/a:
Download fulltext
PDF

Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)