Analyzing the HB and HB+ Protocols in the "Large Error" Case

نویسندگان

  • Jonathan Katz
  • Adam D. Smith
چکیده

HB and HB are two shared-key, unidirectional authentication protocols whose extremely low computational cost makes them potentially well-suited for severely resource-constrained devices. Security of these protocols is based on the conjectured hardness of learning parity with noise; that is, learning a secret s given “noisy” dot products of s that are incorrect with probability ε. Although the problem of learning parity with noise is meaningful for any constant ε < 1/2, existing proofs of security for HB and HB only imply security when ε < 1/4. In this note, we show how to extend these proofs to the case of arbitrary ε < 1/2. 1 Background The HB and HB protocols, introduced by Hopper and Blum [7, 8] and Juels and Weis [11] respectively, are shared-key, unidirectional authentication protocols whose efficiency makes them potentially suitable for resource-constrained devices such as RFID tags. The HB protocol is intended to be secure against a passive (eavesdropping) adversary, while the HB protocol is intended to be secure against an active adversary. Security of these protocols is based on the problem of learning parity with noise (the LPN problem) [1, 2, 3, 4, 6, 13, 7, 8, 14]. Roughly speaking (see Section 2.1 for a formal definition), this problem is to determine a secret value s given “noisy” dot products of s with a sequence of randomly-chosen vectors. These dot products are “noisy” in that they are each incorrect with (independent) probability ε, where ε is a fixed constant. The LPN problem is meaningful for any constant ε ∈ (0, 1 2 ). Juels and Weis [11] gave the first proofs of security for the HB and HB protocols based on the hardness of the LPN problem. Although their proofs tolerate any value of ε, their results have some limitations: (1) they do not handle multiple iterations of the protocol, but instead only analyze a “basic authentication step” which does not by itself provide adequate security; and (2) they do not handle parallel or concurrent executions of the HB protocol. (We refer the reader to [12] for a detailed discussion.) Katz and Shin [12] gave proofs that overcame these limitations, but their proofs only imply meaningful security (in either an asymptotic or a concrete sense) for ε < 1 4 . Work done while the authors were visiting IPAM. Dept. of Computer Science, University of Maryland. [email protected]. This research was supported by NSF Trusted Computing grants #0310751 and #0627306, and NSF CAREER award #0447075. Dept. of Computer Science and Engineering, Pennsylvania State University. [email protected]. While we provide some minimal background, our assumption is that the reader is already familiar with [12].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Large Solitary Hemangioblastoma of the Lateral Ventricles: A Case Report and Literature Review

Hemangioblastoma (HB) in the supratentorial region of the brain is rare and only a few cases are reported on intraventricular HB. HB of the lateral ventricles is even rarer. We present a case of a 30-year-old man with generalized tonic clonic seizures. The brain computed tomography showed a 5.5 cm heterogeneous mass extending into both lateral ventricles with partial enhancement. Based on the s...

متن کامل

Secure and Efficient HB-CM Entity Authentication Protocol

The simple, computationally efficient LPN-based HB-like entity authentication protocols have attracted a great deal of attention in the past few years due to the broad application prospect in low-cost pervasive devices. At present, the most efficient protocol is HB, which is proven to resist the GRS attack under the conjecture that it is secure in the DET-model. In this paper, we introduce an i...

متن کامل

Hemoglobin E/β⁰ Thalassemia in south west Iran - A case series

Background: Beta thalassemia gene mutations are among common mutations in southwest Iran. However, Hemoglobin E (Hb E) and Hb E/β⁰ thalassemia account for a small number of hemoglobinopathies in Iran. This is the first study to directly address the existence of Hb E and consequently Hb E/β⁰ thalassemia in southwest Iran. Methods: This retrospective study discovered seven cases of Hb E/β⁰ thal...

متن کامل

Hemoglobin Daneshgah-Tehran (HBA1:c.218A>G p.His72Arg): a Rare α1-Globin Variant from Iran

There are more than 400 different variations on α-globin protein, and most of them are not associated with noticeable clinical manifestation. Hemoglobin (Hb) is an oxygen-transporting protein and Hb Daneshgah- Tehran is an α-globin variant that for the first time was reported from Iran in a case with normal haematological indices. The capillary electrophoresis of an 8-year- old-girl with normal...

متن کامل

A Case Report of Hb-Geelong in Hormozgan Province

Abstract Background and Objectives Thalassemia is a group of inherited hemoglobin disorders with defect in the synthesis of hemoglobin chains.   Case The young couple resident in Bandar Abbas,  a 23 year old woman with MCV:63fl; MCH:19; HbA2:3.9  and  a 25 year old man with MCV:94fl; MCH:32; HbA2:2.1; HbF:36, were referred to the Bandar Abbas Medical Genetic & PND Center for genetic counsell...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006