Title
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
Abstract
As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.
Year
DOI
Venue
2008
10.1093/ietisy/e91-d.5.1457
IEICE Transactions
Keywords
Field
DocType
pervasive device,privacy-oriented simplification,fast asymmetric encryption,low-cost pervasive device,active attack,privacy protection,asymmetric style,privacy information,lightweight privacy-preserving authentication protocols,pervasive computing technology,low-cost device,authentication protocol,exhaustive search,pervasive computing,random oracle,cryptographic hash function
Authentication,Lightweight protocol,Computer science,Computer security,Cryptography,Cryptographic hash function,Computer network,Random oracle,Encryption,Authentication protocol,Hash function
Journal
Volume
Issue
ISSN
E91-D
5
1745-1361
Citations 
PageRank 
References 
4
0.49
12
Authors
4
Name
Order
Citations
PageRank
Yang Cui1788.57
kazukuni kobara238747.00
Kanta Matsuura325031.20
Hideki Imai440.49