On the Security Proof of an Authentication Protocol from Eurocrypt 2011
- 632 Downloads
This paper discusses the security of one of authentication protocols proposed by Kiltz et al. at Eurocrypt 2011. Kiltz et al. claimed that the protocol is secure against active attacks. However, they did not give rigorous security proof and just mentioned that the scheme would be secure. In this paper, we introduce a new problem that is as hard as the learning parity with noise problem and prove the active security of the protocol under the assumption that the problem is hard. By combining our result with that of Rizomiliotis and Gritzalis, we obtain complete proof of the Man-in-the-Middle (MIM) security of the protocol.
KeywordsRFID Authentication Protocol LPN Problem HB-Family
Unable to display preview. Download preview PDF.
- 2.Bosley, C., Haralambiev, K., Nicolosi, A.: HBN: An HB − like protocol secure against man-in-the-middle attacks. Cryptology ePrint Archive, Report 2011/350 (2011)Google Scholar
- 4.Bringer, J., Chabanne, H., Dottax, E.: HB + + : a Lightweight Authentication Protocol Secure against Some Attacks. In: SecPerU, pp. 28–33. IEEE Computer Society (2006)Google Scholar
- 5.Duc, D.N., Kim, K.: Securing HB + against GRS Man-in-the-Middle Attack. In: SCIS (2007)Google Scholar
- 6.Frumkin, D., Shamir, A.: Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. Cryptology ePrint Archive, Report 2009/044 (2009)Google Scholar
- 9.Gilbert, H., Robshaw, M.J.B., Sibert, H.: An Active Attack Against HB + - A Provably Secure Lightweight Authentication Protocol. IACR Cryptology ePrint Archive, 2005:237 (2005)Google Scholar
- 13.Katz, J., Smith, A.: Analyzing the HB and HB + Protocols in the “Large Error” Case. IACR Cryptology ePrint Archive, 2006:326 (2006)Google Scholar
- 20.Rizomiliotis, P., Gritzalis, S.: Revisiting lightweight authentication protocols based on hard learning problems. In: Buttyán, L., Sadeghi, A.-R., Gruteser, M. (eds.) WiSec, pp. 125–130. ACM (2013)Google Scholar