Authors: Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
Addresses: David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada. ' School of Computer and Communication Sciences, EPFL, CH-1015 Lausanne, Switzerland. ' David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada
Abstract: We look at message recognition protocols (MRPs) and prove that there is a one-to-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we examine the Jane Doe protocol and note its inability to recover in case of a certain adversarial disruption. We propose a variant of this protocol which is equipped with a resynchronisation technique that allows users to resynchronise whenever they wish. Moreover, we propose another protocol which self-recovers in case of an intrusion. This protocol incorporates the resynchronisation technique within itself. Further, we enumerate all possible attacks against this protocol and show that none of the attacks can occur. Finally, we prove the security of the new protocol and its ability to self-recover once the disruption has stopped. Finally, we propose an MRP which provides explicit confirmation to the sender on whether or not the message was accepted by the receiver.
Keywords: message recognition protocols; self-recoverability; explicit confirmation; pervasive networks; ad hoc networks; cryptographic protocols; message authentication; recovery; cryptography; digital signatures; adversarial disruption; resynchronisation; protocol attacks.
International Journal of Applied Cryptography, 2010 Vol.2 No.2, pp.100 - 120
Available online: 28 Jan 2011 *Full-text access for editors Access for subscribers Purchase this article Comment on this article