VK: Secure Systems; Aura, T.This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers.Peer reviewe
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Recently secure device pairing has had significant attention from a wide community of academic as we...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
AbstractThis article presents a new method for pairing devices securely. The commitment-based authen...
a b s t r a c t This article presents a new method for pairing devices securely. The commitment-base...
Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure c...
Abstract—A challenge in facilitating spontaneous mobile interactions is to provide pairing methods t...
As mobile devices become increasingly popular, the necessity for both user-friendly and secure pairi...
In traditional device-to-device (D2D) communication based on wireless channel, identity authenticati...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are b...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
Seamless device pairing conditioned on the context of use fosters novel application domains and ease...
Recently secure device pairing has had significant attention from a wide community of academic as we...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Recently secure device pairing has had significant attention from a wide community of academic as we...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
AbstractThis article presents a new method for pairing devices securely. The commitment-based authen...
a b s t r a c t This article presents a new method for pairing devices securely. The commitment-base...
Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure c...
Abstract—A challenge in facilitating spontaneous mobile interactions is to provide pairing methods t...
As mobile devices become increasingly popular, the necessity for both user-friendly and secure pairi...
In traditional device-to-device (D2D) communication based on wireless channel, identity authenticati...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are b...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
Seamless device pairing conditioned on the context of use fosters novel application domains and ease...
Recently secure device pairing has had significant attention from a wide community of academic as we...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Recently secure device pairing has had significant attention from a wide community of academic as we...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...