dc.contributor.author | Chen, Shan | |
dc.date.accessioned | 2017-03-20T19:14:49Z | |
dc.date.available | 2017-03-20T19:14:49Z | |
dc.date.issued | 2017-03-10 | |
dc.identifier.uri | http://hdl.handle.net/1853/56533 | |
dc.description | Presented on March 10, 2017 at 12:00 p.m. in t he Klaus Advanced Computer Building, Room 1116W. | en_US |
dc.description | Shan Chen is a Ph.D. student in the School of Computer Science at the Georgia Institute of Technology. His research interests are in the areas of cryptography and applied cryptography. | en_US |
dc.description | Runtime: 30:32 minutes | en_US |
dc.description.abstract | Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human-compatible (HC) functions, password-authenticated key exchange (PAKE), commitment, and authenticated encryption. Chen will prove that HAKE protocols can remain secure under reasonable assumptions and will discuss efficient instantiations. He'll also propose a variant where users get help from a small device such as RSA SecurID. This allows implementation of an HC function with stronger security and weakens required assumptions on the PAKE. Overall, this leads to the very efficient HAKE, which can withstand strong corruptions. | en_US |
dc.format.extent | 30:32 minutes | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | Cybersecurity Lecture Series | |
dc.subject | Human computation | en_US |
dc.subject | Key exchange | en_US |
dc.subject | Strong corruptions | en_US |
dc.title | Human Computing for Handling Strong Corruptions in Authenticated Key Exchange | en_US |
dc.type | Moving Image | |
dc.contributor.corporatename | Georgia Institute of Technology. Institute for Information Security & Privacy | en_US |
dc.contributor.corporatename | Georgia Institute of Technology. College of Computing | en_US |
dc.type.genre | Lecture | |