scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: It is demonstrated that Yang and Chang's authentication protocol still is insecure for authentication without password protection and performs inefficiently, and an anonymous authentication protocol (AAP) is offered to solve the performance issue and insecure risks.

37 citations

Journal ArticleDOI
TL;DR: This paper presents a safe and reliable three-factor authentication scheme usable in multi-server environment and gives strong security as well as better complexity in the terms of communication cost, computation cost and estimated time.
Abstract: Recently, Wen et al have developed three-factor authentication protocol for multi-server environment, claiming it to be resistant to several kinds of attacks In this paper, we review Wen et al’s protocol and find that it does not fortify against many security vulnerabilities: (1) inaccurate password change phase, (2) failure to achieve forward secrecy, (3) improper authentication, (4) known session-specific temporary information vulnerability and (5) lack of smart card revocation and biometric update phase To get rid of these security weaknesses, we present a safe and reliable three-factor authentication scheme usable in multi-server environment The Burrows–Abadi–Needham logic shows that our scheme is accurate, and the formal and informal security verifications show that it can defend against various spiteful threats Further, we simulate our scheme using the broadly known Automated Validation of Internet Security Protocols and Applications tool, which ensures that it is safe from the active and passive attacks and also prevent the replay and man-in-the-middle attacks The performance evaluation shows that the presented protocol gives strong security as well as better complexity in the terms of communication cost, computation cost and estimated time

37 citations

Journal ArticleDOI
TL;DR: It is shown that only three assumptions are needed for the security, and no detailed characterizations of the source or the side-channel attacks are needed, which is another striking advantage of the RRDPS protocol over other protocols.
Abstract: Recently, a new type of quantum key distribution, called the round-robin differential phase-shift (RRDPS) protocol [Nature 509, 475 (2014)], was proposed, where the security can be guaranteed without monitoring any statistics. In this Letter, we investigate source imperfections and side-channel attacks on the source of this protocol. We show that only three assumptions are needed for the security, and no detailed characterizations of the source or the side-channel attacks are needed. This high robustness is another striking advantage of the RRDPS protocol over other protocols.

37 citations

Journal ArticleDOI
TL;DR: This paper proposes a new group key agreement protocol for an imbalanced wireless network consisting of many mobile nodes with limited computing capability and a powerful node with less restriction and shows that the proposed protocol is well suited for mobile devices withlimited computing capability.

37 citations

Book ChapterDOI
17 Dec 2007
TL;DR: In this paper, a low-cost and strong-security RFID protocol is proposed to reduce the computational load on both the back-end database and the tags in an RFID system.
Abstract: This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a communication failure or malicious attack, the proposed protocol can recover synchronization between the database and the tag in the following session. Furthermore, the proposed protocol also satisfies most security requirements, including the strong privacy property defined by Juels and Weis, plus robustness against replay and spoofing attacks and forward security.

36 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795