Efficient generation of shared RSA keys
Journal of the ACM (JACM)
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Robust Key-Evolving Public Key Encryption Schemes
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Strong Key-Insulated Signature Schemes
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Delegation of cryptographic servers for capture-resilient devices
Distributed Computing
Dictionary attacks using keyboard acoustic emanations
Proceedings of the 13th ACM conference on Computer and communications security
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Weak forward security in mediated RSA
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Decision making in assistive environments using multimodal observations
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Strong mobile device protection from loss and capture
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
An event driven framework for assistive CPS environments
ACM SIGBED Review - Special Issue on the 2nd Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability
Hi-index | 0.00 |
Mobile devices play a critical role in assistive environments. How to authenticate and secure communications among them has become more important especially against loss and capture of the devices. In this paper, we present an approach to protect signing keys of mobile devices based on mediated RSA introduced by Dan Boneh and others. The important property of our scheme is transparent self-resilience. In other words, in case a device is lost or captured and at the risk of being compromised and impersonated, our scheme can disable the device instantly and the replacement will be transparent to other users. In this way, if an attacker captures a mobile device, he has limited time to use it because it will become soon invalid. If he wants to break our scheme, he must compromise the device and its mediator simultaneously.