Presentation | 2019-03-08 Authentication with hash chain computation model Shinta Hirai, Masakazu Soshi, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Due to the spread of IoT devices, the number of devices restricted by memory etc. has increased. In order to securely communicate between these IoT devices, it is sufficient to have $N$ keys when the number of users is $N$. However, in that case, as the number of users increases, the number of necessary keys becomes enormous. Therefore, hash chain aggregation (HCA) was devised by Kurihara cite{HCA_PST} as a way to perform mutual authentication efficiently and lightly. The HCA is a method of assigning multiple hash values to each user and generating a common key using them, and the hash value that each user needs to hold is $O(log N)$ pieces. However, when multiple people collide and attack HCA, it is possible that non-authenticators can calculate common keys between certifiers. In this paper, we first assume the case of two attackers. proposed an improved HCA that reduces such combinations and describe the number of hash values required for common key generation in the improved HCA |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | IoT / Authentication / Hash Function / Hash Chain |
Paper # | ICSS2018-84 |
Date of Issue | 2019-02-28 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2019/3/7(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | NICT Okinawa Electromagnetic Technology Center |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Security, etc. |
Chair | Yoshiaki Shiraishi(Kobe Univ.) |
Vice Chair | Hiroki Takakura(NII) / Katsunari Yoshioka(Yokohama National Univ.) |
Secretary | Hiroki Takakura(NTT) / Katsunari Yoshioka(NICT) |
Assistant | Akira Yamada(KDDI labs.) / Keisuke Kito(Mitsubishi Electric) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Authentication with hash chain computation model |
Sub Title (in English) | |
Keyword(1) | IoT |
Keyword(2) | Authentication |
Keyword(3) | Hash Function |
Keyword(4) | Hash Chain |
1st Author's Name | Shinta Hirai |
1st Author's Affiliation | Hiroshima City University(Hiroshima City Univ.) |
2nd Author's Name | Masakazu Soshi |
2nd Author's Affiliation | Hiroshima City University(Hiroshima City Univ.) |
Date | 2019-03-08 |
Paper # | ICSS2018-84 |
Volume (vol) | vol.118 |
Number (no) | ICSS-486 |
Page | pp.pp.149-153(ICSS), |
#Pages | 5 |
Date of Issue | 2019-02-28 (ICSS) |