Ontology type: schema:ScholarlyArticle Open Access: True
2010-02-17
AUTHORSJonathan Katz, Ji Sun Shin, Adam Smith
ABSTRACTHopper and Blum (Asiacrypt 2001) and Juels and Weis (Crypto 2005) recently proposed two shared-key authentication protocols—HB and HB+, respectively—whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency identification (RFID) tags. The security of these protocols is based on the conjectured hardness of the “learning parity with noise” (LPN) problem, which is equivalent to the problem of decoding random binary linear codes. The HB protocol is proven secure against a passive (eavesdropping) adversary, while the HB+ protocol is proven secure against active attacks. More... »
PAGES402-421
http://scigraph.springernature.com/pub.10.1007/s00145-010-9061-2
DOIhttp://dx.doi.org/10.1007/s00145-010-9061-2
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1012126245
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Dept. of Computer Science, University of Maryland, College Park, USA",
"id": "http://www.grid.ac/institutes/grid.410443.6",
"name": [
"Dept. of Computer Science, University of Maryland, College Park, USA"
],
"type": "Organization"
},
"familyName": "Katz",
"givenName": "Jonathan",
"id": "sg:person.01354261156.67",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01354261156.67"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Dept. of Computer Science, University of Maryland, College Park, USA",
"id": "http://www.grid.ac/institutes/grid.410443.6",
"name": [
"Dept. of Computer Science, University of Maryland, College Park, USA"
],
"type": "Organization"
},
"familyName": "Shin",
"givenName": "Ji Sun",
"id": "sg:person.015326027245.79",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015326027245.79"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, USA",
"id": "http://www.grid.ac/institutes/grid.29857.31",
"name": [
"Dept. of Computer Science and Engineering, The Pennsylvania State University, University Park, USA"
],
"type": "Organization"
},
"familyName": "Smith",
"givenName": "Adam",
"id": "sg:person.013307226666.21",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013307226666.21"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/3-540-45682-1_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1027730722",
"https://doi.org/10.1007/3-540-45682-1_4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11832072_24",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1009973045",
"https://doi.org/10.1007/11832072_24"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11535218_18",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1048110650",
"https://doi.org/10.1007/11535218_18"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-30576-7_2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1047370291",
"https://doi.org/10.1007/978-3-540-30576-7_2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-85230-8_12",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1000904993",
"https://doi.org/10.1007/978-3-540-85230-8_12"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11941378_5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1033812388",
"https://doi.org/10.1007/11941378_5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-78967-3_21",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028765794",
"https://doi.org/10.1007/978-3-540-78967-3_21"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bfb0053430",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1045273682",
"https://doi.org/10.1007/bfb0053430"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11538462_32",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1022279726",
"https://doi.org/10.1007/11538462_32"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bf00195207",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1051079135",
"https://doi.org/10.1007/bf00195207"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-48329-2_24",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1045214757",
"https://doi.org/10.1007/3-540-48329-2_24"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11761679_6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1037494651",
"https://doi.org/10.1007/11761679_6"
],
"type": "CreativeWork"
}
],
"datePublished": "2010-02-17",
"datePublishedReg": "2010-02-17",
"description": "Hopper and Blum (Asiacrypt 2001) and Juels and Weis (Crypto 2005) recently proposed two shared-key authentication protocols\u2014HB and HB+, respectively\u2014whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency identification (RFID) tags. The security of these protocols is based on the conjectured hardness of the \u201clearning parity with noise\u201d (LPN) problem, which is equivalent to the problem of decoding random binary linear codes. The HB protocol is proven secure against a passive (eavesdropping) adversary, while the HB+ protocol is proven secure against active attacks.",
"genre": "article",
"id": "sg:pub.10.1007/s00145-010-9061-2",
"inLanguage": "en",
"isAccessibleForFree": true,
"isFundedItemOf": [
{
"id": "sg:grant.3084991",
"type": "MonetaryGrant"
}
],
"isPartOf": [
{
"id": "sg:journal.1136278",
"issn": [
"0933-2790",
"1432-1378"
],
"name": "Journal of Cryptology",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "3",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "23"
}
],
"keywords": [
"random binary linear codes",
"radio frequency identification (RFID) tags",
"low computational cost",
"active attacks",
"concurrent security",
"Learning Parity",
"passive adversary",
"HB protocol",
"low-cost devices",
"computational cost",
"conjectured hardness",
"binary linear codes",
"linear codes",
"security",
"identification tags",
"protocol",
"Juels",
"adversary",
"attacks",
"code",
"tags",
"Blum",
"cost",
"devices",
"noise",
"Wei",
"hopper",
"parity",
"hardness",
"problem",
"Hb"
],
"name": "Parallel and Concurrent Security of the HB and HB+ Protocols",
"pagination": "402-421",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1012126245"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s00145-010-9061-2"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s00145-010-9061-2",
"https://app.dimensions.ai/details/publication/pub.1012126245"
],
"sdDataset": "articles",
"sdDatePublished": "2022-06-01T22:09",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/article/article_505.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s00145-010-9061-2"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00145-010-9061-2'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00145-010-9061-2'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00145-010-9061-2'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00145-010-9061-2'
This table displays all metadata directly associated to this object as RDF triples.
156 TRIPLES
22 PREDICATES
68 URIs
48 LITERALS
6 BLANK NODES