An overview of symmetric fuzzy PAKE protocols
dc.contributor.author | Ottenhues, Johannes | |
dc.contributor.editor | Wendzel, Steffen | |
dc.contributor.editor | Wressnegger, Christian | |
dc.contributor.editor | Hartmann, Laura | |
dc.contributor.editor | Freiling, Felix | |
dc.contributor.editor | Armknecht, Frederik | |
dc.contributor.editor | Reinfelder, Lena | |
dc.date.accessioned | 2024-04-19T12:54:04Z | |
dc.date.available | 2024-04-19T12:54:04Z | |
dc.date.issued | 2024 | |
dc.description.abstract | Fuzzy password authenticated key exchange (fuzzy PAKE) protocols enable two parties to securely exchange a session-key for further communication. The parties only need to share a low entropy password. The passwords do not even need to be identical, but can contain some errors. This may be due to typos, or because the passwords were created from noisy biometric readings. In this paper we provide an overview and comparison of existing fuzzy PAKE protocols. Furthermore, we analyze certain security properties of these protocols and argue that the protocols can be expected to be slightly more secure in practice than can be inferred from their theoretical guarantees. | en |
dc.identifier.doi | 10.18420/sicherheit2024_005 | |
dc.identifier.isbn | 978-3-88579-739-5 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/43969 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2024 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings Volume P-345 | |
dc.subject | Cryptographic protocols | |
dc.subject | Fuzzy password authenticated key exchange | |
dc.subject | Biometrics | |
dc.title | An overview of symmetric fuzzy PAKE protocols | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 89 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 75 | |
gi.conference.date | 09.-11.04.2024 | |
gi.conference.location | Worms | |
gi.conference.sessiontitle | Full Paper Session 2 – Kryptographie |
Dateien
Originalbündel
1 - 1 von 1