Journal on Communications ›› 2013, Vol. 34 ›› Issue (8): 18-26.doi: 10.3969/j.issn.1000-436x.2013.08.003

• Papers • Previous Articles     Next Articles

Rational analysis of authentication protocols based on NGUYEN L H scheme

Xing-hua LI1,2,Ling-juan DENG1,Yuan ZHANG1,Jian-feng MA1   

  1. 1 School of Computer Science and Technology,Xidian University,Xi'an 710071,China
    2 State Key Lab.for Novel Software Technology,Nanjing University,Nanjing 210032,China
  • Online:2013-08-25 Published:2017-08-31
  • Supported by:
    The Major National S&T Program;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Fundamental Research Funds for the Central Universities;The Fundamental Research Funds for the Central Universities

Abstract:

Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.

Key words: identity authentication protocol, game theory, protocol security

No Suggested Reading articles found!