About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Concrete Security for Entity Recognition: The Jane Doe Protocol

In Progress in Cryptology - Indocrypt 2008 — 2008, pp. 158-171
From

Discrete mathematics, Department of Mathematics, Technical University of Denmark1

Department of Mathematics, Technical University of Denmark2

Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal proof of its concrete security.

The protocol neither employs asymmetric cryptography, nor a trusted third party, nor any key pre-distribution. It is suitable for light-weight cryptographic devices such as sensor network motes and RFID tags.

Language: English
Publisher: Springer
Year: 2008
Pages: 158-171
Proceedings: 9th International Conference on Cryptology in India
Series: Lecture Notes in Computer Science
ISBN: 3540897534 , 3540897542 , 9783540897538 and 9783540897545
Types: Conference paper

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis