Skip to main content

Identification Protocols for Pervasive Devices


Overview
People
News
Publications


Overview

Many human identification protocols are suitable to be applied to the authentication of devices with low resources. One such human identification protocol proposed by Hopper and Blum (HB), was modified to be used for authenticating devices. Since then a lot of research is done on many variants of the HB protocol as an identification protocol for devices. There is some advantage of using the HB protocol over an identification protocol that uses a block cipher such as AES, namely ease of implementation (since only simple operations are required, and provided there is a cheap source of randomness).

The aim of this project is to explore other human identification protocols presented in literature and modify them to be used as identification protocols for resource constrained devices. The process involves three essential steps: (a) modifying the protocol to be secure against active adversaries (most human identification protocols are only secure against passive adversaries), (b) show that the underlying problem is hard by reducing it to some known hard mathematical problem, (c) implementing the protocol to see if there are any performance advantages over the HB family of protocols.

Our current research involves constructing an identification protocol based on the Foxtail protocol (a human identification protocol).

People

  • Hassan Jameel Asghar, Data61-CSIRO.
  • Matthieu Monteiro, Data61-CSIRO.
  • Kumara Kahatapitya, Data61-CSIRO.
  • Thierry Rakotoarivelo, Data61-CSIRO.
  • Kanchana Thilakarathna, Data61-CSIRO.
  • Dali Kaafar, Data61-CSIRO.
  • Shujun Li, University of Surrey.
  • Ron Steinfeld, Monash University
  • Josef Pieprzyk, QUT

News

 

Publications

  • Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Dali Kaafar, Josef Pieprzyk 2015, On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices. IEEE Transactions on Information Forensics and Security, vol. 10, no, 8, pp. 1643-1655, April, 2015.