Abstract
Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal proof of its concrete security. The protocol neither employs asymmetric cryptography, nor a trusted third party, nor any key pre-distribution. It is suitable for light-weight cryptographic devices such as sensor network motes and RFID tags.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. ACM Operating Systems Review 32 (1998)
Arkko, J., Nikander, P.: Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. In: Proc. Security Protocols Workshop 2002 (2002)
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773. Springer, Heidelberg (1994)
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic design of two-party authentication protocols. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576. Springer, Heidelberg (1992)
Buonadonna, P., Hill, J., Culler, D.: Active Message Communication for Tiny Networked Sensors. In: Proc. 20th Joint Conference of the IEEE Computer and Communications Societies. IEEE, Los Alamitos (2001)
Coppersmith, D., Jakobsson, M.: Almost Optimal Hash Sequence Traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)
Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Trans. Information Theory 29(2), 198–208 (1983)
Dielsma, P., Mödersheim, S., Vigano, L., Basin, D.: Formalizing and Analyzing Sender Invariance. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691. Springer, Heidelberg (2007)
Gollmann, D.: Protocol Design: Coming Down from the Cloud (Invited Talk). In: Workshop on RFID and Lightweight Crypto 2005 (2005), http://www.iaik.tugraz.at/research/krypto/events/
Hammell, J., Weimerskirch, A., Girao, J., Westhoff, D.: Recognition in a Low-Power Environment. In: Proc. ICDCSW 2005. IEEE, Los Alamitos (2005)
Hodjat, A., Verbauwhede, I.: The Energy Cost of Secrets in Ad-hoc Networks. In: IEEE Circuits and Systems workshop on wireless communications and networking. IEEE, Los Alamitos (2002)
Lucks, S., Zenner, E., Weimerskirch, A., Westhoff, D.: Entity Recognition for Sensor Network Motes. In: Proc. INFORMATIK 2005, vol. 2, pp. 145–149 (2005); LNI Vol. P-68, ISBN 3-88579-379-0 (an early 5-page abstract of the current research)
Lucks, S., Zenner, E., Weimerskirch, A., Westhoff, D.: Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper), eprint, full version of the current paper
Mitchell, C.: Remote User Authentication Using Public Information. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898. Springer, Heidelberg (2003)
Russell, S.: Fast Checking of Individual Certificate Revocation on Small Systems. In: Proc. 15th Annual Computer Security Application Conference. IEEE, Los Alamitos (1999)
Seigneur, J.-M., Farrell, S., Jensen, C., Gray, E., Chen, Y.: End-to-end trust in pervasive computing starts with recognition. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802. Springer, Heidelberg (2004)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796. Springer, Heidelberg (2000)
Weimerskirch, A., Westhoff, D.: Zero Common-Knowledge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006. Springer, Heidelberg (2004)
Weimerskirch, A., Westhoff, D., Lucks, S., Zenner, E.: Efficient Pairwise Authentication Protocols for Sensor and Ad-hoc Networks. In: Sensor Network Operations. IEEE Press, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lucks, S., Zenner, E., Weimerskirch, A., Westhoff, D. (2008). Concrete Security for Entity Recognition: The Jane Doe Protocol . In: Chowdhury, D.R., Rijmen, V., Das, A. (eds) Progress in Cryptology - INDOCRYPT 2008. INDOCRYPT 2008. Lecture Notes in Computer Science, vol 5365. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89754-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-89754-5_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89753-8
Online ISBN: 978-3-540-89754-5
eBook Packages: Computer ScienceComputer Science (R0)