User-mediated authentication protocols and unforgeability in key collision

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This research provides a computational analysis of the ISO 9798-6 standard’s Mechanism 7a authentication protocol. In contrast to typical authentication protocols, ISO 9798-6 mechanism 7a requires user interaction and aims to authenticate data possession instead of identities. Consequently, we introduce a 3-party possession user mediated authentication (3-PUMA) model. Furthermore, we demonstrate the necessary security guarantees of the MAC primitive – which include non-standard assumptions – and introduce existential unforgeability under key collision attacks (EUF-KCA). The resulting analysis demonstrates a notable lack in the standard’s requirements and has implications for other PUMA protocols.

Cite

CITATION STYLE

APA

Hale, B. (2018). User-mediated authentication protocols and unforgeability in key collision. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11192 LNCS, pp. 387–396). Springer Verlag. https://doi.org/10.1007/978-3-030-01446-9_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free