Work in progress


From Ecrypt Lightweight

Jump to: navigation, search

Hopper and Blum proposed an authentication protocol based on the Learning Parity with Noise problem. This protocol is commonly known as the HB protocol. Several variants exist (HB+, HB++, HB-MP, HB-MP+, Trusted-HB, HB#).

  • Nicholas J. Hopper, Manuel Blum: Secure Human Identification Protocols. ASIACRYPT 2001: 52-66. bibtex pdf
  • Ari Juels, Stephen A. Weis: Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005: 293-308. bibtex pdf
  • Jonathan Katz, Ji Sun Shin: Parallel and Concurrent Security of the HB and HB+ Protocols. EUROCRYPT 2006: 73-87. bibtex pdf
  • Éric Levieil, Pierre-Alain Fouque: An Improved LPN Algorithm. SCN 2006: 348-359. bibtex pdf
  • Henri Gilbert, Matt Robshaw, Herve Sibert: An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. Cryptology ePrint Archive. bibtex pdf
  • Jonathan Katz, Adam Smith: Analyzing the HB and HB+ Protocols in the ``Large Error Case. Cryptology ePrint Archive. bibtex pdf
  • Julien Bringer, Hervé Chabanne, Emmanuelle Dottax: HB++: a Lightweight Authentication Protocol Secure against Some Attacks. SecPerU 2006: 28-33 bibtex pdf
  • Jonathan Katz: Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise. IMA Int. Conf. 2007: 1-15 bibtex pdf
  • Jorge Munilla, Alberto Peinado: HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9): 2262-2267 (2007) bibtex pdf
  • Dang Nguyen Duc, Kwangjo Kim: Securing HB+ against GRS Man-in-the-Middle Attack. Proc. Of SCIS 2007, Abstracts pp.123, Jan. 23-26, 2007, Sasebo, Japan. pdf
  • Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin: HB#: Increasing the Security and Efficiency of HB+. EUROCRYPT 2008: 361-378 bibtex pdf
  • Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin: Good Variants of HB+ Are Hard to Find. Financial Cryptography 2008: 156-170. bibtex pdf
  • Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin: How to Encrypt with the LPN Problem. ICALP (2) 2008: 679-690. bibtex pdf
  • Julien Bringer, Hervé Chabanne: Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9): 4339-4342 (2008). bibtex pdf
  • Khaled Ouafi, Raphael Overbeck, Serge Vaudenay: On the Security of HB# against a Man-in-the-Middle Attack. ASIACRYPT 2008: 108-124. bibtex pdf
  • Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada: Practical Attacks on HB and HB+ Protocols. Cryptology ePrint Archive. bibtex pdf
  • Xuefei Leng, Keith Mayes, Konstantinos Markantonakis: HB-MP+ Protocol: An Improvement on the HB-MP Protocol. IEEE International Conference on RFID, 2008: 118-124, April 2008. pdf
  • Dmitry Frumkin, Adi Shamir: Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. Cryptology ePrint Archive. bibtex pdf
Personal tools