A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Breaking and fixing the HB+DB protocol
2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '17
The HB protocol and its HB + successor are lightweight authentication schemes based on the Learning Parity with Noise (LPN) problem. They both suffer from the so-called GRS-attack whereby a man-in-the-middle (MiM) adversary can recover the secret key. At WiSec 2015, Pagnin et al. proposed the HB+DB protocol: HB + with an additional distance-bounding dimension added to detect and counteract such MiM attacks. They showed experimentally that HB+DB was resistant to GRS adversaries, and also
doi:10.1145/3098243.3098263
dblp:conf/wisec/BoureanuG0O17
fatcat:ie6gcjfi7ng2havps3dzmfo2fi