This story draft by @escholar has not been reviewed by an editor, YET.

Recovery Failure Rate Analysis

EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
0-item

Table of Links

Abstract and 1. Introduction

  1. Related Work

    2.1 The Alternative-Authenticator Approach

    2.2 The Original-Authenticator Approach

  2. The Proposed Secret Backup Approaches

    3.1 Notations

    3.2 Assumptions

    3.3 The Direct-Escrow Method

    3.4 Our Proposed Algorithms

  3. Security and Reliability Analysis

    4.1 Security Analysis

    4.2 Reliability Analysis

    4.3 Recovery Failure Rate Analysis

    4.4 Real World Parameters

    4.5 Failure Rate Optimization of (k,n)

  4. Comparison

  5. Conclusion, Acknowledgment, and References

Appendix

4.3 Recovery Failure Rate Analysis

As discussed above, a successful recovery approach should be secure and reliable. For a more precise evaluation of any recovery approach, we define the recovery failure rate F as the probability that an approach is either not secure or not reliable.


F = 1 - (1 - P) x (1 - Q) = P + Q - PQ,


where


P = the attack success rate in equation (1)


Q = the recovery failure rate in equation (2)


Since, in general, P, Q<<1 and PQ<<P,Q, we have F = P + Q


Authors:

(1) Wei-Hsin Chang, Deepmentor Inc. ([email protected]);

(2) Ren-Song Tsay, Computer Science Department, National TsingHua University, Hsinchu, Taiwan ([email protected]).


This paper is available on arxiv under CC BY 4.0 DEED license.


L O A D I N G
. . . comments & more!

About Author

EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
EScholar: Electronic Academic Papers for Scholars@escholar
We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community

Topics

Around The Web...

Trending Topics

blockchaincryptocurrencyhackernoon-top-storyprogrammingsoftware-developmenttechnologystartuphackernoon-booksBitcoinbooks