• DocumentCode
    940
  • Title

    A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices

  • Author

    Chien-Ming Chen ; King-Hang Wang ; Tsu-Yang Wu ; Jeng-Shyang Pan ; Hung-Min Sun

  • Author_Institution
    Innovative Inf. Ind. Res. Center, Harbin Inst. of Technol., Shenzhen, China
  • Volume
    8
  • Issue
    8
  • fYear
    2013
  • fDate
    Aug. 2013
  • Firstpage
    1318
  • Lastpage
    1330
  • Abstract
    The man-in-the-middle (MITM) attack is the major threat for handheld devices to agree on a session key in which they do not share any prior secret in advance, even if these devices are physically located in the same place. Apart from insecurely typing passwords into handheld devices or comparing long hexadecimal keys displayed on the devices´ screens, many other human-verifiable protocols have been proposed in the literature to solve the problem. Unfortunately, most of these schemes are unscalable to more users. Even when there are only three entities attempting to agree on a session key, these protocols need to be rerun three times. In this paper, we present a bipartite and a tripartite authentication protocol using a temporary confidential channel. Besides, we further extend the system into a transitive authentication protocol that allows multiple handheld devices to establish a conference key securely and efficiently. In addition, we provide a formal proof to our protocol to demonstrate our scheme is indeed secure. We also implement the prototype of the system on a mobile phone with satisfying performance.
  • Keywords
    cryptographic protocols; mobile handsets; MITM attack; bipartite authentication protocol; conference key; hexadecimal keys; man-in-the-middle attack; mobile devices; mobile phone; multiple handheld devices; scalable transitive human-verifiable authentication protocol; session key; temporary confidential channel; tripartite authentication protocol; Authentication; Cameras; Handheld computers; Mobile handsets; Protocols; Public key; Visualization; Human verifiable authentication protocol; mobile security;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2013.2270106
  • Filename
    6544216