Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016 (2016), Article ID 9289050, 9 pages
http://dx.doi.org/10.1155/2016/9289050
Research Article

A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

1Mathematical Institute, Serbian Academy of Sciences and Arts, Kneza Mihaila 36, 11000 Belgrade, Serbia
2Faculty of Transport and Traffic Engineering, University of Belgrade, Vojvode Stepe 305, 11000 Belgrade, Serbia

Received 25 December 2015; Accepted 24 March 2016

Academic Editor: Zoran Obradovic

Copyright © 2016 Siniša Tomović et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Juels, “RFID security and privacy: a research survey,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381–394, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Piramuthu, “Lightweight cryptographic authentication in passive RFID-Tagged systems,” IEEE Transactions on Systems, Man and Cybernetics—Part C: Applications and Reviews, vol. 38, no. 3, pp. 360–376, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. J. L. Hernandez-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, and L. Ladid, “Toward a lightweight authentication and authorization framework for smart objects,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 4, pp. 690–702, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. I. Ratković, N. Bežanić, O. S. Ünsal, A. Cristal, and V. Milutinović, “An overview of architecture-level power- and energy-efficient design techniques,” Advances in Computers, vol. 98, pp. 1–57, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. N. J. Hopper and M. Blum, “Secure human identification protocols,” in Advances in Cryptology—ASIACRYPT 2001, C. Boyd, Ed., vol. 2248 of Lecture Notes in Computer Science, pp. 52–66, Springer, Heidelberg, Germany, 2001. View at Publisher · View at Google Scholar
  6. E. R. Berlekamp, R. J. McEliece, and H. C. van Tilborg, “On the inherent intractability of certain coding problems,” Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. IT-24, no. 3, pp. 384–386, 1978. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. A. Juels and S. A. Weis, “Authenticating pervasive devices with human protocols,” in Advances in Cryptology—CRYPTO 2005, V. Shoup, Ed., vol. 3621 of Lecture Notes in Computer Science, pp. 293–308, Springer, Heidelberg, Germany, 2005. View at Publisher · View at Google Scholar
  8. J. Katz and J. S. Shin, “Parallel and concurrent security of the HB and HB+ protocols,” in Advances in Cryptology—EUROCRYPT 2006, S. Vaudenay, Ed., vol. 4004 of Lecture Notes in Computer Science, pp. 73–87, Springer, Heidelberg, Germany, 2006. View at Publisher · View at Google Scholar
  9. J. Katz, J. S. Shin, and A. Smith, “Parallel and concurrent security of the HB and HB+ protocols,” Journal of Cryptology, vol. 23, no. 3, pp. 402–421, 2010. View at Publisher · View at Google Scholar
  10. H. Gilbert, M. Robshaw, and H. Sibert, “Active attack against HB+: a provably secure lightweight authentication protocol,” Electronics Letters, vol. 41, no. 21, pp. 1169–1170, 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Munilla and A. Peinado, “HB-MP: a further step in the HB-family of lightweight authentication protocols,” Computer Networks, vol. 51, no. 9, pp. 2262–2267, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Bringer and H. Chabanne, “Trusted-HB: a low-cost version of HB+ secure against man-in-the-middle attacks,” IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4339–4342, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. H. Gilbert, M. J. B. Robshaw, and Y. Seurin, “HB#: increasing the security and efficiency of HB+,” in Advances in Cryptology—EUROCRYPT 2008, N. Smart, Ed., vol. 4965 of Lecture Notes in Computer Science, pp. 361–378, Springer, Heidelberg, Germany, 2008. View at Publisher · View at Google Scholar
  14. K. Ouafi, R. Overbeck, and S. Vaudenay, “On the security of HB# against a man-in-the-middle attack,” in Advances in Cryptology—ASIACRYPT 2008, J. Pieprzyk, Ed., vol. 5350 of Lecture Notes in Computer Science, pp. 108–124, Springer, Heidelberg, Germany, 2008. View at Publisher · View at Google Scholar
  15. E. Kiltz, K. Pietrzak, D. Cash, A. Jain, and D. Venturi, “Efficient authentication from hard learning problems,” in Advances in Cryptology—EUROCRYPT 2011, K. G. Paterson, Ed., vol. 6632 of Lecture Notes in Computer Science, pp. 7–26, Springer, Heidelberg, Germany, 2011. View at Publisher · View at Google Scholar
  16. E. Kosei and N. Kunihiro, “On the security proof of an authentication protocol from Eurocrypt 2011,” in Advances in Information and Computer Security, M. Yoshida and K. Mouri, Eds., vol. 8639 of Lecture Notes in Computer Science, pp. 187–203, Springer, Heidelberg, Germany, 2014. View at Publisher · View at Google Scholar
  17. J. Cichoń, M. Klonowski, and M. Kutyłowski, “Privacy protection for RFID with hidden subset identifiers,” in Pervasive Computing, J. Indulska, D. J. Patterson, T. Rodden, and M. Ott, Eds., vol. 5013 of Lecture Notes in Computer Science, pp. 298–314, 2008. View at Publisher · View at Google Scholar
  18. Z. Gołębiewski, K. Majcher, and F. Zagórski, “Attacks on CKK family of RFID authentication protocols,” in Ad-Hoc, Mobile and Wireless Networks, D. Coudert, D. Simplot-Ryl, and I. Stojmenovic, Eds., vol. 5198 of Lecture Notes in Computer Science, pp. 241–250, 2008. View at Publisher · View at Google Scholar
  19. M. Krause and M. Hamann, “The cryptographic power of random selection,” in Selected Areas in Cryptography, SAC 2011, vol. 7118 of Lecture Notes in Computer Science, pp. 134–150, Springer, New York, NY, USA, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. V. Lyubashevsky and D. Masny, “Man-in-the-middle secure authentication schemes from LPN and weak PRFs,” in Advances in Cryptology—CRYPTO 2013, R. Canetti and J. A. Garay, Eds., vol. 8043 of Lecture Notes in Computer Science, pp. 308–325, Springer, Heidelberg, Germany, 2013. View at Publisher · View at Google Scholar