Rational analysis of authentication protocols based on NGUYEN L H scheme

Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that whe...

Full description

Saved in:
Bibliographic Details
Main Authors: Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.08.003/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539808802897920
author Xing-hua LI
Ling-juan DENG
Yuan ZHANG
Jian-feng MA
author_facet Xing-hua LI
Ling-juan DENG
Yuan ZHANG
Jian-feng MA
author_sort Xing-hua LI
collection DOAJ
description Using the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.
format Article
id doaj-art-5bd39132f1ad457887f32550924cc9fc
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-5bd39132f1ad457887f32550924cc9fc2025-01-14T06:41:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-08-0134182659673954Rational analysis of authentication protocols based on NGUYEN L H schemeXing-hua LILing-juan DENGYuan ZHANGJian-feng MAUsing the ideas of game theory,NGUYEN L H transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run,so that even if an attacker attacks a protocol,the attacker’s payoff will still be lower than that when it does not.In such a way,the security of the protocol was guaranteed.However,this scheme suffers from two shortcomings:the considered is too attacker powerful,and only its payoff was considered and the cost of the attacks was ignored; the situation in which the honest node would choose to send useless data was not considered.To improve this scheme,the value of α,with the consideration of the attack cost,of which the value is more general was given.What’s more,the attack probability β was introduced.Based on this,the precondition that the honest node transmits the useless data was presented,as well as the value of α under the different β values.Compared with the original scheme,this results are more generic and comprehensive.Meanwhile,through a case analysis in the P2P network,the correctness of the conclusion is proved.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.08.003/identity authentication protocolgame theoryprotocol security
spellingShingle Xing-hua LI
Ling-juan DENG
Yuan ZHANG
Jian-feng MA
Rational analysis of authentication protocols based on NGUYEN L H scheme
Tongxin xuebao
identity authentication protocol
game theory
protocol security
title Rational analysis of authentication protocols based on NGUYEN L H scheme
title_full Rational analysis of authentication protocols based on NGUYEN L H scheme
title_fullStr Rational analysis of authentication protocols based on NGUYEN L H scheme
title_full_unstemmed Rational analysis of authentication protocols based on NGUYEN L H scheme
title_short Rational analysis of authentication protocols based on NGUYEN L H scheme
title_sort rational analysis of authentication protocols based on nguyen l h scheme
topic identity authentication protocol
game theory
protocol security
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.08.003/
work_keys_str_mv AT xinghuali rationalanalysisofauthenticationprotocolsbasedonnguyenlhscheme
AT lingjuandeng rationalanalysisofauthenticationprotocolsbasedonnguyenlhscheme
AT yuanzhang rationalanalysisofauthenticationprotocolsbasedonnguyenlhscheme
AT jianfengma rationalanalysisofauthenticationprotocolsbasedonnguyenlhscheme