Expected loss analysis for authentication in constrained channels

نویسندگان

  • Christos Dimitrakakis
  • Aikaterini Mitrokotsa
  • Serge Vaudenay
چکیده

We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a number of authentication protocols, where at least some part of the authentication is performed during a phase, lasting n rounds, with no error correction. This requires assigning an acceptable threshold for the number of detected errors and taking into account the cost of incorrect authentication and of communication. This paper describes a framework enabling an expected loss analysis for all the protocols in this family. Computationally simple methods to obtain nearly optimal values for the threshold, as well as for the number of rounds are suggested and upper bounds on the expected loss, holding uniformly, are given. These bounds are tight, as shown by a matching lower bound. Finally, a method to adaptively select both the number of rounds and the threshold is proposed for a certain class of protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Rational distance-bounding protocols over noisy channels

We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels in a distance-bounding protocol. The optimal threshold will ensure that even if an intruder attempts to cause incorrect authentication, the expected loss the verifier suffers will still be lower than when the intruder do...

متن کامل

Determination of seepage loss in earthen channels supplied by Hamoon channel in Dorodzan irrigation and drainage network.

Irrigation channels, which are parts of rainwater catchment systems, have been used for water supply in agriculture for a long time. Seepage loss in irrigation channels is one of the farmers' concerns. Seepage loss, especially in earthen channels, can be noticeable. Different equations have been developed to estimate seepage loss amount in irrigation channels. However, the accuracy of the equat...

متن کامل

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in cons...

متن کامل

Uncertainty in linear fractional transportation problem

In this paper, we study the linear fractional transportation problem with uncertain arameters. After recalling some definitions, concepts and theorems in uncertainty theory we present three approaches for solving this problem. First we consider the expected value of the objective function together with the expectation of satisfying constraints. Optimizing the expected value of the objective fun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2015