Logo des Repositoriums
 

An overview of symmetric fuzzy PAKE protocols

dc.contributor.authorOttenhues, Johannes
dc.contributor.editorWendzel, Steffen
dc.contributor.editorWressnegger, Christian
dc.contributor.editorHartmann, Laura
dc.contributor.editorFreiling, Felix
dc.contributor.editorArmknecht, Frederik
dc.contributor.editorReinfelder, Lena
dc.date.accessioned2024-04-19T12:54:04Z
dc.date.available2024-04-19T12:54:04Z
dc.date.issued2024
dc.description.abstractFuzzy password authenticated key exchange (fuzzy PAKE) protocols enable two parties to securely exchange a session-key for further communication. The parties only need to share a low entropy password. The passwords do not even need to be identical, but can contain some errors. This may be due to typos, or because the passwords were created from noisy biometric readings. In this paper we provide an overview and comparison of existing fuzzy PAKE protocols. Furthermore, we analyze certain security properties of these protocols and argue that the protocols can be expected to be slightly more secure in practice than can be inferred from their theoretical guarantees.en
dc.identifier.doi10.18420/sicherheit2024_005
dc.identifier.isbn978-3-88579-739-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/43969
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings Volume P-345
dc.subjectCryptographic protocols
dc.subjectFuzzy password authenticated key exchange
dc.subjectBiometrics
dc.titleAn overview of symmetric fuzzy PAKE protocolsen
dc.typeText/Conference Paper
gi.citation.endPage89
gi.citation.publisherPlaceBonn
gi.citation.startPage75
gi.conference.date09.-11.04.2024
gi.conference.locationWorms
gi.conference.sessiontitleFull Paper Session 2 – Kryptographie

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
A2-3.pdf
Größe:
878.36 KB
Format:
Adobe Portable Document Format