A general attack model on hash-based client puzzles

被引:0
|
作者
Price, G [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Dept Math, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a general attack model against hash-based client puzzles. Our attack is generic in that it works against many published protocols. We introduce a new protocol and subsequently attack our new construction as well. We conclude by drawing two requirements of client puzzle protocols that would overcome our attack.
引用
下载
收藏
页码:319 / 331
页数:13
相关论文
共 50 条
  • [31] DePass: A Secure Hash-based Authentication Scheme
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElAlaoui, Abdelbaki ElBelrhiti
    2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
  • [32] Hash-based labeling techniques for storage scaling
    Shu-Yuen D. Yao
    Cyrus Shahabi
    Per-Åke Larson
    The VLDB Journal, 2005, 14 : 222 - 237
  • [33] A Hash-based Secure Interface on Plain Connection
    Liu, Zhenxing
    Lallie, Harjinder S.
    Liu, Lu
    Zhan, Yongzhao
    Wu, Kaigui
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1236 - 1239
  • [34] SPHINCS: Practical Stateless Hash-Based Signatures
    Bernstein, Daniel J.
    Hopwood, Daira
    Hulsing, Andreas
    Lange, Tanja
    Niederhagen, Ruben
    Papachristodoulou, Louiza
    Schneider, Michael
    Schwabe, Peter
    Wilcox-O'Hearn, Zooko
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 368 - 397
  • [35] Hash-tree PCA: accelerating PCA with hash-based grouping
    Battulga, Lkhagvadorj
    Lee, Sang-Hyun
    Nasridinov, Aziz
    Yoo, Kwan-Hee
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (10): : 8248 - 8264
  • [36] Hash-Based Identification of Sparse Image Tampering
    Tagliasacchi, Marco
    Valenzise, Giuseppe
    Tubaro, Stefano
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2009, 18 (11) : 2491 - 2504
  • [37] Hardware support for a hash-based IP traceback
    Sanchez, LA
    Milliken, WC
    Snoeren, AC
    Tchakountio, F
    Jones, CE
    Kent, ST
    Partridge, C
    Strayer, WT
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 146 - 152
  • [38] A hash-based collaborative transcoding proxy system
    Wu, X
    Tan, KL
    DATA & KNOWLEDGE ENGINEERING, 2004, 51 (02) : 161 - 188
  • [39] Practical Hash-based Anonymity for MAC Addresses
    Ali, Junade
    Dyo, Vladimir
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 572 - 579
  • [40] Hash-based Internet traffic load balancing
    Jo, JY
    Kim, Y
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 204 - 209