Detail publikace

Light-weight Mutual Authentication with Non-repudiation

Originální název

Light-weight Mutual Authentication with Non-repudiation

Anglický název

Light-weight Mutual Authentication with Non-repudiation

Jazyk

en

Originální abstrakt

In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic.

Anglický abstrakt

In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic.

BibTex


@article{BUT141300,
  author="Vlastimil {Člupek} and Václav {Zeman} and Petr {Dzurenda}",
  title="Light-weight Mutual Authentication with Non-repudiation",
  annote="In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic.",
  chapter="141300",
  doi="10.13164/re.2018.0143",
  howpublished="online",
  number="1",
  volume="27",
  year="2018",
  month="april",
  pages="143--150",
  type="journal article"
}