Ontology type: schema:Chapter Open Access: True
2008
AUTHORSHenri Gilbert , Matthew J. B. Robshaw , Yannick Seurin
ABSTRACTThe strikingly simple HB + protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB + have been proposed and these are intended to build on the security of HB + while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB + protocol remains the most attractive member of the HB + family. More... »
PAGES156-170
Financial Cryptography and Data Security
ISBN
978-3-540-85229-2
978-3-540-85230-8
http://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12
DOIhttp://dx.doi.org/10.1007/978-3-540-85230-8_12
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1000904993
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France",
"id": "http://www.grid.ac/institutes/grid.89485.38",
"name": [
"Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
],
"type": "Organization"
},
"familyName": "Gilbert",
"givenName": "Henri",
"id": "sg:person.012771236207.08",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France",
"id": "http://www.grid.ac/institutes/grid.89485.38",
"name": [
"Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
],
"type": "Organization"
},
"familyName": "Robshaw",
"givenName": "Matthew J. B.",
"id": "sg:person.07740641253.74",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07740641253.74"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France",
"id": "http://www.grid.ac/institutes/grid.89485.38",
"name": [
"Orange Labs, 38\u201340 rue du General Leclerc, Issy les Moulineaux, France"
],
"type": "Organization"
},
"familyName": "Seurin",
"givenName": "Yannick",
"id": "sg:person.011724731171.01",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
],
"type": "Person"
}
],
"datePublished": "2008",
"datePublishedReg": "2008-01-01",
"description": "The strikingly simple HB\u2009+\u2009 protocol of Juels and Weis [11] has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an elegant proof of security. After its publication, Gilbert et al. [8] demonstrated a simple man-in-the-middle attack that allowed an attacker to recover the secret authentication keys. (The attack does not contradict the proof of security since the attacker lies outside the adversarial model.) Since then a range of schemes closely related to HB\u2009+\u2009 have been proposed and these are intended to build on the security of HB\u2009+\u2009 while offering resistance to the attack of [8]. In this paper we show that many of these variants can still be attacked using the techniques of [8] and the original HB\u2009+\u2009 protocol remains the most attractive member of the HB\u2009+\u2009 family.",
"editor": [
{
"familyName": "Tsudik",
"givenName": "Gene",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-540-85230-8_12",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-540-85229-2",
"978-3-540-85230-8"
],
"name": "Financial Cryptography and Data Security",
"type": "Book"
},
"keywords": [
"low-cost RFID tags",
"secret authentication keys",
"authentication key",
"middle attack",
"RFID tags",
"range of schemes",
"security",
"best variant",
"attacks",
"authentication",
"original Hb",
"attacker",
"Juels",
"protocol",
"scheme",
"key",
"tags",
"attractive members",
"proof",
"technique",
"elegant proof",
"variants",
"simple man",
"et al",
"publications",
"Wei",
"range",
"members",
"al",
"family",
"Gilbert et al",
"men",
"resistance",
"paper",
"Hb"
],
"name": "Good Variants of HB + Are Hard to Find",
"pagination": "156-170",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1000904993"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-540-85230-8_12"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-540-85230-8_12",
"https://app.dimensions.ai/details/publication/pub.1000904993"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-08-04T17:16",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_205.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-540-85230-8_12"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-85230-8_12'
This table displays all metadata directly associated to this object as RDF triples.
108 TRIPLES
22 PREDICATES
60 URIs
53 LITERALS
7 BLANK NODES