Title
Hybrid authentication based on noisy channels
Abstract
We consider a cryptographic scenario where some center broadcasts a random binary string to Alice, Bob and Eve over binary symmetric channels with bit error probabilities e A, e B and e E respectively. Alice and Bob share no secret key initially, and their goal is to generate, after public discussion, a common information-theoretically secure key facing an active eavesdropper Eve. Under the condition e AE and e BE, code authentication (CA) can be used as part of a public discussion protocol to solve this problem. This authentication exploits parts of substrings received by Alice and Bob from the broadcasting center as authenticators to messages transmitted in a public discussion. Unfortunately, it happens to be ineffective because it produces a key of small length. We propose a hybrid authentication (HA) that combines both keyless code authentication and key authentication based on an almost strong universal class of hash functions. We prove a theorem that allows estimation of the performance evaluation of hybrid authentication. The selection algorithm for the main HA parameters, given security and reliability thresholds, is presented in detail.
Year
DOI
Venue
2003
10.1007/s10207-002-0017-x
Int. J. Inf. Sec.
Keywords
DocType
Volume
Key sharing,Privacy amplification,Information-theoretically secure authentication,Hash functions
Journal
1
Issue
Citations 
PageRank 
4
2
0.41
References 
Authors
5
2
Name
Order
Citations
PageRank
Valery I. Korzhik13515.45
Guillermo Morales-luna29928.89