Abstract
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Internet of Things in 2020. Technical report, Joint European Commission / EPoSS Expert Workshop (2008)
Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM 42(12), 40–46 (1999)
Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance. In: Third Symposium on Operating Systems Design and Implementation, New Orleans, USA (1999)
Desmedt, Y., Burmester, M., Safavi-Naini, R., Wang, H.: Threshold Things That Think (T4): Security Requirements to Cope with Theft of Handheld/Handless Internet Devices. In: Symposium on Requirements Engineering for Information Security, West Lafayette, Indiana, USA (2001)
Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Technical Report ISSE-TR-97-01, George Mason University (July 1997), ftp://isse.gmu.edu/pub/techrep/97_01_jajodia.ps.gz
Frankel, Y., Gemmell, P., MacKenzie, P.D., Yung, M.: Optimal Resilience Proactive Public-Key Cryptosystems. In: CRYPTO 1997. LNCS, vol. 1294, pp. 384–393. Springer, Heidelberg (1997)
Gehrmann, C., Mitchell, C., Nyberg, K.: Manual Authentication for Wireless Devices. RSA Cryptobytes 7(1), 29–37 (2004)
Gehrmann, C., Nyberg, K., Mitchell, C.: The personal CA–PKI for Personal Area Network. In: Proceedings of the 11th Information Society Technologies (IST) Mobile and Wireless Communications Summit, pp. 31–35 (2002)
Hardekopf, B., Kwiat, K., Upadhyaya, S.: A Decentralized Voting Algorithm for Increasing Dependability. In: Distributed Systems. 5th World MultiConference on Systemic, Cybernetics and Informatics, SCI 2001 (2001)
Landrock, P., Pedersen, T.: WYSIWYS? – What you see is what you sign? Information Security Technical Report 3(2), 55–61 (1998)
Laur, S., Pasini, S.: SAS-Based Group Authentication and Key Agreement Protocols. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 197–213. Springer, Heidelberg (2008)
Nguyen, L.H., Roscoe, A.W.: Efficient group authentication protocols based on human interaction. Cryptology ePrint Archive, Report 2009/150 (2009), http://eprint.iacr.org/
Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)
Wang, S., Safavi-Naini, R.: New Results on Unconditionally Secure Multi-receiver Manual Authentication. In: ICITS 2007. LNCS. Springer, Heidelberg (2007)
Wong, T.M., Wang, C., Wing, J.M.: Verifiable Secret Redistribution for Threshold Sharing Schemes. Technical Report CMU-CS-02-114, Carnegie Mellon University (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Peeters, R., Kohlweiss, M., Preneel, B. (2009). Threshold Things That Think: Authorisation for Resharing. In: Camenisch, J., Kesdogan, D. (eds) iNetSec 2009 – Open Research Problems in Network Security. 2009. IFIP Advances in Information and Communication Technology, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05437-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-05437-2_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05436-5
Online ISBN: 978-3-642-05437-2
eBook Packages: Computer ScienceComputer Science (R0)