a b s t r a c t This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and manin-the-middle attackers
Recently secure device pairing has had significant attention from a wide community of academic as we...
Recently secure device pairing has had significant attention from a wide community of academic as we...
Abstract—With the prevalence of mobile computing, lots of wireless devices need to establish secure ...
AbstractThis article presents a new method for pairing devices securely. The commitment-based authen...
VK: Secure Systems; Aura, T.This article presents a new method for pairing devices securely. The com...
Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure c...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Abstract—A challenge in facilitating spontaneous mobile interactions is to provide pairing methods t...
As mobile devices become increasingly popular, the necessity for both user-friendly and secure pairi...
In traditional device-to-device (D2D) communication based on wireless channel, identity authenticati...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Seamless device pairing conditioned on the context of use fosters novel application domains and ease...
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are b...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Recently secure device pairing has had significant attention from a wide community of academic as we...
Recently secure device pairing has had significant attention from a wide community of academic as we...
Abstract—With the prevalence of mobile computing, lots of wireless devices need to establish secure ...
AbstractThis article presents a new method for pairing devices securely. The commitment-based authen...
VK: Secure Systems; Aura, T.This article presents a new method for pairing devices securely. The com...
Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure c...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Abstract—A challenge in facilitating spontaneous mobile interactions is to provide pairing methods t...
As mobile devices become increasingly popular, the necessity for both user-friendly and secure pairi...
In traditional device-to-device (D2D) communication based on wireless channel, identity authenticati...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Seamless device pairing conditioned on the context of use fosters novel application domains and ease...
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are b...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Recently secure device pairing has had significant attention from a wide community of academic as we...
Recently secure device pairing has had significant attention from a wide community of academic as we...
Abstract—With the prevalence of mobile computing, lots of wireless devices need to establish secure ...