【24h】

On Hidden Credential Retrieval

机译:隐藏凭证检索

获取原文
获取原文并翻译 | 示例
           

摘要

Hidden Credential Retrieval (HCR) protocols are designed for access credentials management where users who remember short passwords can retrieve his/her various credentials (access keys and tokens) with the help of remote storage server over insecure networks (e.g., the Internet). In this paper, we revisit a HCR protocol (we call it B-HCR) based on Boldyreva's blind signature scheme. In particular, we show that the B-HCR protocol is insecure against an outside attacker who impersonates server S. Specifically, the attacker can find out the user's password pw with off-line dictionary attacks by eavesdropping the communications between the user and a third-party online service provider. And we discuss why Boyen's security model does not capture the attacks.
机译:隐式凭证检索(HCR)协议旨在用于访问凭证管理,其中记住短密码的用户可以在不安全的网络(例如Internet)上借助远程存储服务器来检索其各种凭证(访问密钥和令牌)。在本文中,我们将基于Boldyreva的盲签名方案重新审视HCR协议(称为B-HCR)。特别是,我们证明了B-HCR协议对于冒充服务器S的外部攻击者是不安全的。具体地说,攻击者可以通过窃听用户与第三方服务器之间的通信来发现具有离线字典攻击的用户密码pw。派对在线服务提供商。我们讨论了博因的安全模型为何无法捕获攻击的原因。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号