DocumentCode :
2988850
Title :
Analysis of the Authentication Protocols Based on Game Theory
Author :
Li, Xinghua ; Deng, Lingjuan ; Zhang, Yuan ; Yang, Dan ; Ma, Jianfeng
Author_Institution :
Key Lab. of Comput. Networks & Inf. Security (Minist. of Educ.), Xidian Univ., Xi´´an, China
fYear :
2011
fDate :
3-4 Dec. 2011
Firstpage :
788
Lastpage :
792
Abstract :
Using the ideas of game theory, L. H. Nguyen transformed two families of authentication protocols where the honest party transmitted some useless data with probability α before the normal protocol run, so that even if an attacker attacks a protocol, the attacker´s payoff will still be lower than when it does not. In such a way, the security of the protocol is guaranteed. However, this scheme suffers from two shortcomings: (1) the attacker considered is too powerful, only its payoff is considered and the cost of the attacks is ignored, (2) it did not consider in which situation the honest node would choose to send useless data. To improve this scheme, we give the value of with the consideration of the attack cost which value is more general. What´s more, the attack probability β is introduced. Based on which, the precondition that the honest node transmits the useless data is presented, as well as the value of under the different β value. Compared to the original scheme, our results are more generic and comprehensive.
Keywords :
cryptographic protocols; game theory; probability; L. H. Nguyen scheme; authentication protocols; game theory; probability; protocol security; Authentication; Computer science; Cryptography; Game theory; Games; Protocols; game theory; identity authentication protocol; protocol security formatting;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security (CIS), 2011 Seventh International Conference on
Conference_Location :
Hainan
Print_ISBN :
978-1-4577-2008-6
Type :
conf
DOI :
10.1109/CIS.2011.179
Filename :
6128235
Link To Document :
بازگشت