Abstract
In this paper, we examine the online authentication method based on Merkle (hash) tree focusing on its reliability. Coming from side channels in online authentication, the effectiveness runs into danger in the long run. With consideration of effectiveness, we present a Merkle tree based online authentication resilient against side channels by obfuscating authentication proofs. Security and efficiency are analyzed to demonstrate the practicality of the proposed approach.
Original language | English |
---|---|
Title of host publication | Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017 |
Editors | Shiping Chen, Ilkay Altintas |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 840-843 |
Number of pages | 4 |
ISBN (Electronic) | 9781538607527 |
DOIs | |
Publication status | Published - 2017 Sept 7 |
Event | 24th IEEE International Conference on Web Services, ICWS 2017 - Honolulu, United States Duration: 2017 Jun 25 → 2017 Jun 30 |
Publication series
Name | Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017 |
---|
Conference
Conference | 24th IEEE International Conference on Web Services, ICWS 2017 |
---|---|
Country/Territory | United States |
City | Honolulu |
Period | 17/6/25 → 17/6/30 |
Bibliographical note
Funding Information:proofs and optimizations for further improved performance. Additional analysis according to varying lengths of sibling paths would be studied in depth as well. ACKNOWLEDGMENT This work was supported by the ICT R&D program of MSIP/IITP. [B0717-16-0097, Development of V2X Service Integrated Security Technology for Autonomous Driving Vehicle] for Dongyoung Koo. Also, this work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP; Ministry of Science, ICT & Future Planning) (No.2017R1C1B5015045) for Youngjoo Shin and (No.2015R1C1A1A02036511) for Joobeom Yun, respectively. This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government(MSIP) (No.B0190-15-2028, Development of Active Security Control System for Safe Public Cloud Service) for Junbeom Hur.
Keywords
- Merkle tree
- authentication
- proof of ownership
- reliability
- side channels
ASJC Scopus subject areas
- Computer Networks and Communications
- Information Systems and Management