DocumentCode
940
Title
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices
Author
Chien-Ming Chen ; King-Hang Wang ; Tsu-Yang Wu ; Jeng-Shyang Pan ; Hung-Min Sun
Author_Institution
Innovative Inf. Ind. Res. Center, Harbin Inst. of Technol., Shenzhen, China
Volume
8
Issue
8
fYear
2013
fDate
Aug. 2013
Firstpage
1318
Lastpage
1330
Abstract
The man-in-the-middle (MITM) attack is the major threat for handheld devices to agree on a session key in which they do not share any prior secret in advance, even if these devices are physically located in the same place. Apart from insecurely typing passwords into handheld devices or comparing long hexadecimal keys displayed on the devices´ screens, many other human-verifiable protocols have been proposed in the literature to solve the problem. Unfortunately, most of these schemes are unscalable to more users. Even when there are only three entities attempting to agree on a session key, these protocols need to be rerun three times. In this paper, we present a bipartite and a tripartite authentication protocol using a temporary confidential channel. Besides, we further extend the system into a transitive authentication protocol that allows multiple handheld devices to establish a conference key securely and efficiently. In addition, we provide a formal proof to our protocol to demonstrate our scheme is indeed secure. We also implement the prototype of the system on a mobile phone with satisfying performance.
Keywords
cryptographic protocols; mobile handsets; MITM attack; bipartite authentication protocol; conference key; hexadecimal keys; man-in-the-middle attack; mobile devices; mobile phone; multiple handheld devices; scalable transitive human-verifiable authentication protocol; session key; temporary confidential channel; tripartite authentication protocol; Authentication; Cameras; Handheld computers; Mobile handsets; Protocols; Public key; Visualization; Human verifiable authentication protocol; mobile security;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2013.2270106
Filename
6544216
Link To Document