Abstract
This paper discusses the security of one of authentication protocols proposed by Kiltz et al. at Eurocrypt 2011. Kiltz et al. claimed that the protocol is secure against active attacks. However, they did not give rigorous security proof and just mentioned that the scheme would be secure. In this paper, we introduce a new problem that is as hard as the learning parity with noise problem and prove the active security of the protocol under the assumption that the problem is hard. By combining our result with that of Rizomiliotis and Gritzalis, we obtain complete proof of the Man-in-the-Middle (MIM) security of the protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the Inherent Intractability of Certain Coding Problems. IEEE Transactions on Information Theory 24, 384–386 (1978)
Bosley, C., Haralambiev, K., Nicolosi, A.: HBN: An HB − like protocol secure against man-in-the-middle attacks. Cryptology ePrint Archive, Report 2011/350 (2011)
Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9), 4339–4342 (2008)
Bringer, J., Chabanne, H., Dottax, E.: HB + + : a Lightweight Authentication Protocol Secure against Some Attacks. In: SecPerU, pp. 28–33. IEEE Computer Society (2006)
Duc, D.N., Kim, K.: Securing HB + against GRS Man-in-the-Middle Attack. In: SCIS (2007)
Frumkin, D., Shamir, A.: Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. Cryptology ePrint Archive, Report 2009/044 (2009)
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Good Variants of HB + Are Hard to Find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156–170. Springer, Heidelberg (2008)
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB + . In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361–378. Springer, Heidelberg (2008)
Gilbert, H., Robshaw, M.J.B., Sibert, H.: An Active Attack Against HB + - A Provably Secure Lightweight Authentication Protocol. IACR Cryptology ePrint Archive, 2005:237 (2005)
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)
Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)
Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB + Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73–87. Springer, Heidelberg (2006)
Katz, J., Smith, A.: Analyzing the HB and HB + Protocols in the “Large Error” Case. IACR Cryptology ePrint Archive, 2006:326 (2006)
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7–26. Springer, Heidelberg (2011)
Lyubashevsky, V., Masny, D.: Man-in-the-middle secure authentication schemes from LPN and weak PRFs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 308–325. Springer, Heidelberg (2013)
Munilla, J., Peinado, A.: HB − MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9), 2262–2267 (2007)
Ouafi, K., Overbeck, R., Vaudenay, S.: On the Security of HB# against a Man-in-the-Middle Attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 108–124. Springer, Heidelberg (2008)
Pietrzak, K.: Subspace LWE. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 548–563. Springer, Heidelberg (2012)
Rizomiliotis, P., Gritzalis, S.: GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 489–506. Springer, Heidelberg (2012)
Rizomiliotis, P., Gritzalis, S.: Revisiting lightweight authentication protocols based on hard learning problems. In: Buttyán, L., Sadeghi, A.-R., Gruteser, M. (eds.) WiSec, pp. 125–130. ACM (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Endo, K., Kunihiro, N. (2014). On the Security Proof of an Authentication Protocol from Eurocrypt 2011. In: Yoshida, M., Mouri, K. (eds) Advances in Information and Computer Security. IWSEC 2014. Lecture Notes in Computer Science, vol 8639. Springer, Cham. https://doi.org/10.1007/978-3-319-09843-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-09843-2_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09842-5
Online ISBN: 978-3-319-09843-2
eBook Packages: Computer ScienceComputer Science (R0)