Topic
Otway–Rees protocol
About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: It is demonstrated that Yang and Chang's authentication protocol still is insecure for authentication without password protection and performs inefficiently, and an anonymous authentication protocol (AAP) is offered to solve the performance issue and insecure risks.
37 citations
••
TL;DR: This paper presents a safe and reliable three-factor authentication scheme usable in multi-server environment and gives strong security as well as better complexity in the terms of communication cost, computation cost and estimated time.
Abstract: Recently, Wen et al have developed three-factor authentication protocol for multi-server environment, claiming it to be resistant to several kinds of attacks In this paper, we review Wen et al’s protocol and find that it does not fortify against many security vulnerabilities: (1) inaccurate password change phase, (2) failure to achieve forward secrecy, (3) improper authentication, (4) known session-specific temporary information vulnerability and (5) lack of smart card revocation and biometric update phase To get rid of these security weaknesses, we present a safe and reliable three-factor authentication scheme usable in multi-server environment The Burrows–Abadi–Needham logic shows that our scheme is accurate, and the formal and informal security verifications show that it can defend against various spiteful threats Further, we simulate our scheme using the broadly known Automated Validation of Internet Security Protocols and Applications tool, which ensures that it is safe from the active and passive attacks and also prevent the replay and man-in-the-middle attacks The performance evaluation shows that the presented protocol gives strong security as well as better complexity in the terms of communication cost, computation cost and estimated time
37 citations
••
TL;DR: It is shown that only three assumptions are needed for the security, and no detailed characterizations of the source or the side-channel attacks are needed, which is another striking advantage of the RRDPS protocol over other protocols.
Abstract: Recently, a new type of quantum key distribution, called the round-robin differential phase-shift (RRDPS) protocol [Nature 509, 475 (2014)], was proposed, where the security can be guaranteed without monitoring any statistics. In this Letter, we investigate source imperfections and side-channel attacks on the source of this protocol. We show that only three assumptions are needed for the security, and no detailed characterizations of the source or the side-channel attacks are needed. This high robustness is another striking advantage of the RRDPS protocol over other protocols.
37 citations
••
TL;DR: This paper proposes a new group key agreement protocol for an imbalanced wireless network consisting of many mobile nodes with limited computing capability and a powerful node with less restriction and shows that the proposed protocol is well suited for mobile devices withlimited computing capability.
37 citations
••
17 Dec 2007TL;DR: In this paper, a low-cost and strong-security RFID protocol is proposed to reduce the computational load on both the back-end database and the tags in an RFID system.
Abstract: This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a communication failure or malicious attack, the proposed protocol can recover synchronization between the database and the tag in the following session. Furthermore, the proposed protocol also satisfies most security requirements, including the strong privacy property defined by Juels and Weis, plus robustness against replay and spoofing attacks and forward security.
36 citations