Memo on variants of HB
See also [[Weis's bib.:http://saweis.net/hbplus.html]]
- HB
- [HB01-AC] Nicholas J. Hopper, Manuel Blum: Secure Human Identification Protocols. ASIACRYPT 2001
- [KSS09-JC] Jonathan Katz, Ji Sun Shin, Adam Smith: Parallel and Concurrent Security of the HB and HB+ Protocols. J. Cryptology 23(3): 402-421 (2010)
- [KS06-EC] Jonathan Katz, Ji Sun Shin: Parallel and Concurrent Security of the HB and HB+ Protocols. EUROCRYPT 2006: 73-87 (and ePrint 2005/461)
- [KS06-eP] Jonathan Katz, Adam Smith: Analyzing the HB and HB+ Protocols in the ``Large Error'' Case. IACR Cryptology ePrint Archive 2006: 326 (2006)
- HB+
- [[[JW05-C] Ari Juels and Stephen A. Weis: Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005
- See also [[[KSS09-JC].
- HB*
- HB++
- BCD06-SecPerU] Julien Bringer, Herve Chananne, and Emmanuelle Dottax: HB++: a lightweight authentication protocol secure against some attack. SecPerU 2006.
- HBN
- HB-MP
- [MP07-CN] J. Munilla and A. Peinado. HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9), 2262--2267 (2007)
- Trusted-HB
- [BC08-IEEEIT] Julien Bringer and Hervé Chabanne: Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks. IEEE Transactions on Information Theory, 54(9), 2008
- PUF-HB
- Ghaith Hammouri and Berk Sunar: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. ACNS 2008
- HB+PUF
- Ghaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar: Unclonable Lightweight Authentication Scheme. ICICS 2008
- HB-MP+
- [LMM08-RFID] X. Leng, K. Mayes, and K. Markantonakis: HB-MP+ Protocol: An Improvement on the HB-MP Protocol. IEEE International Conference on RFID. 2008.
- HB♯
- [GRS08-EC] Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin: HB♯: Increasing the Security and Efficiency of HB+. EUROCRYPT 2008
- HB-CM
- [LGQ09-eP] Zhijun Li and Guang Gong and Zhiguang Qin: Secure and Efficient HB-CM Entity Authentication Protocol. [[ePrint 2009/444:http://eprint.iacr.org/2009/444]]
- NLHB
- [MTSV10-ISIT] Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankarasubramanian, and Kapali Viswanathan: NLHB: A Non-Linear Hopper-Blum Protocol. ISIT 2010
- KPCJV11
- [KPCJV11-EC] Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, and Daniele Venturi: Effiient authentication from hard learning problems. EUROCRYPT 2011
- F-HB
- [CON11-Lightsec] X. Cao and M. O'Neill: F-HB: An Efficient Forward Private Protocol. Lightsec 2011
- HB^{\mathcal{C}}
- [LG11-IETInfoSec] Z. Li and G. Gong: HB^{\mathcal{C}} entity authentication for low-cost pervasive devices. (IET Information Security, 2011)
- HB♭
- [SKII12-ISITA] Xuedi Song, Kazukuni Kobara, Kentaro Imafuku, Hideki Imai. “HB♭ Protocol For Lightweight Authentication; Its Information Theoretic Indistinguishability Against MITM Attack Watching Reader's Response.” (ISITA 2012)
- DKPW12
- Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, and Daniel Wichs: Message Authentication, Revisited. EUROCRYP 2012, [[ePrint 2012/059:http://eprint.iacr.org/2012/059]]
- LAPIN
- [HKLPP12-FSE] Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, and Krzysztof Pietrzak: Lapin: An efficient authentication protocol based on ring-LPN. FSE 2012.
- GHB#
- [RG12-ACNS] Panagiotis Rizomiliotis, Stefanos Gritzalis: GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol (ACNS 2012)
- MMR12
- [MMR12-NSS] Mohammad S. I. Mamun, Atsuko Miyaji, and Mohammad S. Rahman. “A Secure and Private RFID Authentication Protocol under SLPN Problem.” (NSS 2012)
- ???
- [LM13-eP] Vadim Lyubashevsky and Daniel Masny: Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. [[ePrint 2013/092:http://eprint.iacr.org/2013/092]]
- A comprehensive table in page 4.
- Tree-LSHB+
- [DLZW13-WPC] Guanyang Deng, Hui Li, Ying Zhang, Jun Wang: Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol (Wireless Personal Communications. Vol.72, Issue 1, 2013)
Attacks [#ea9737d2]
- [GRS05-EL] Henri Gilbert, Matt Robshaw, and Herve Sibert: An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. IEE Electronic Letters 41, 21, 2005
- [FS??-eP] Dmitry Frumkin and Adi Shamir: Un-Trusted-HB: Security Vulnerabilities of Trusted-HB.