{"id":"https://openalex.org/W2758634049","doi":"https://doi.org/10.1515/jmc-2015-0059","title":"When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack","display_name":"When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2758634049","doi":"https://doi.org/10.1515/jmc-2015-0059","mag":"2758634049"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2015-0059","is_oa":false,"landing_page_url":"https://doi.org/10.1515/jmc-2015-0059","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/9ffae6cf6af04c0b8d4bbf4e01444c91","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049859678","display_name":"Hassan Jameel Asghar","orcid":"https://orcid.org/0000-0001-6168-6497"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hassan Jameel Asghar","raw_affiliation_strings":["Data Privacy Team , Data61, CSIRO , 13 Garden Street, Eveleigh, NSW 2015 , Sydney , Australia","Data Privacy Team, Data61, CSIRO, 13 Garden Street, Eveleigh, NSW 2015, Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Data Privacy Team , Data61, CSIRO , 13 Garden Street, Eveleigh, NSW 2015 , Sydney , Australia","institution_ids":["https://openalex.org/I42894916"]},{"raw_affiliation_string":"Data Privacy Team, Data61, CSIRO, 13 Garden Street, Eveleigh, NSW 2015, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040251515","display_name":"Mohamed Ali K\u00e2afar","orcid":"https://orcid.org/0000-0003-2714-0276"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mohamed Ali Kaafar","raw_affiliation_strings":["Data Privacy Team , Data61, CSIRO , 13 Garden Street, Eveleigh, NSW 2015 , Sydney , Australia","Data Privacy Team, Data61, CSIRO, 13 Garden Street, Eveleigh, NSW 2015, Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Data Privacy Team , Data61, CSIRO , 13 Garden Street, Eveleigh, NSW 2015 , Sydney , Australia","institution_ids":["https://openalex.org/I42894916"]},{"raw_affiliation_string":"Data Privacy Team, Data61, CSIRO, 13 Garden Street, Eveleigh, NSW 2015, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049859678"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":null,"fwci":0.5063,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75413363,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"11","issue":"3","first_page":"177","last_page":"194"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.9297885894775391},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837448120117188},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.742290735244751},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6115226745605469},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6087639331817627},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5757580995559692},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5565492510795593},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5224341750144958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4600209593772888},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4448294937610626},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4280984401702881},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.2851184010505676},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12556776404380798},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.10069987177848816},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.06568795442581177}],"concepts":[{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.9297885894775391},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837448120117188},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.742290735244751},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6115226745605469},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6087639331817627},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5757580995559692},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5565492510795593},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5224341750144958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4600209593772888},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4448294937610626},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4280984401702881},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.2851184010505676},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12556776404380798},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.10069987177848816},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.06568795442581177},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2015-0059","is_oa":false,"landing_page_url":"https://doi.org/10.1515/jmc-2015-0059","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9ffae6cf6af04c0b8d4bbf4e01444c91","is_oa":true,"landing_page_url":"https://doaj.org/article/9ffae6cf6af04c0b8d4bbf4e01444c91","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 11, Iss 3, Pp 177-194 (2017)","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:9ffae6cf6af04c0b8d4bbf4e01444c91","is_oa":true,"landing_page_url":"https://doaj.org/article/9ffae6cf6af04c0b8d4bbf4e01444c91","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 11, Iss 3, Pp 177-194 (2017)","raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1529679142","https://openalex.org/W1560940245","https://openalex.org/W1570998442","https://openalex.org/W2019017059","https://openalex.org/W2039428813","https://openalex.org/W2098290609","https://openalex.org/W2107465855","https://openalex.org/W2121121824","https://openalex.org/W2152236265","https://openalex.org/W2157007820","https://openalex.org/W2160584199","https://openalex.org/W2162610170","https://openalex.org/W2167634085","https://openalex.org/W2172089374","https://openalex.org/W2401910316","https://openalex.org/W2539824335","https://openalex.org/W2899598218"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W87530933","https://openalex.org/W4240432851","https://openalex.org/W2102905434","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Abstract":[0],"Cryptographic":[1],"identification":[2,22,65,70,123,269],"protocols":[3,18,23,61,71,124,270],"enable":[4],"a":[5,12,42,53,58,97,116,150,172,194],"prover":[6,27,37,51],"to":[7,11,39,41,57,86,105,109,164,231,263],"prove":[8],"its":[9],"identity":[10],"verifier.":[13,48],"A":[14],"subclass":[15],"of":[16,44,99,135,153,169,205,221,224,250,254],"such":[17,60,83],"are":[19,62],"shared-secret":[20,120],"challenge-response":[21,121,154,170,225],"in":[24,79,92],"which":[25,125],"the":[26,29,32,36,47,50,80,88,93,100,107,133,136,146,166,182,185,203,206,222,233,236,251,255],"and":[28,35,113,187,199,238],"verifier":[30],"share":[31],"same":[33],"secret":[34,102,137,147,207,234],"has":[38],"respond":[40],"series":[43],"challenges":[45,89],"from":[46,157],"When":[49],"is":[52,85,103,139,161,209],"human,":[54],"as":[55],"opposed":[56],"machine,":[59],"called":[63],"human":[64,69],"protocols.":[66],"To":[67],"make":[68,87],"usable,":[72],"protocol":[73,174,186,261],"designers":[74,262],"have":[75],"proposed":[76],"different":[77],"techniques":[78],"literature.":[81],"One":[82],"technique":[84],"sparse":[90,127,273],",":[91],"sense":[94],"that":[95,131,271],"only":[96],"subset":[98,134,204],"shared":[101],"used":[104,138,177,208],"compute":[106],"response":[108],"each":[110],"challenge.":[111],"Coskun":[112,237],"Herley":[114,239],"demonstrated":[115],"generic":[117],"attack":[118,183],"on":[119,184],"type":[122],"use":[126],"challenges.":[128,274],"They":[129],"showed":[130],"if":[132,202],"too":[140],"small,":[141],"an":[142,218,229,247],"eavesdropper":[143,230],"can":[144,175,196],"learn":[145],"after":[148],"observing":[149],"small":[151,211],"number":[152,168,223],"pairs.":[155],"Unfortunately,":[156],"their":[158],"results,":[159],"it":[160],"not":[162,210],"possible":[163],"find":[165,232],"safe":[167,265],"pairs":[171,226],"sparse-challenge":[173],"be":[176,197],"for,":[178],"without":[179],"actually":[180],"implementing":[181],"weeding":[188],"out":[189],"unsafe":[190],"parameter":[191,266],"sizes.":[192],"Such":[193],"task":[195],"time-consuming":[198],"computationally":[200],"infeasible":[201],"enough.":[212],"In":[213],"this":[214,242],"work,":[215],"we":[216,244],"show":[217],"analytical":[219,248],"estimate":[220,249],"required":[227],"by":[228],"through":[235],"attack.":[240,256],"Against":[241],"number,":[243],"also":[245],"give":[246],"time":[252],"complexity":[253],"Our":[257],"results":[258],"will":[259],"help":[260],"choose":[264],"sizes":[267],"for":[268],"employ":[272]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
