The CONVERGENCE Security Infrastructure

  • Thomas Huebner
  • Andreas Kohlos
  • Amit Shrestha
  • Carsten Rust
Chapter
Part of the Signals and Communication Technology book series (SCT)

Abstract

This chapter describes the Convergence security infrastructure. The core component for Convergence Security (CoSec) has a distributed architecture. It encompasses subcomponents on different computing platforms such as client computers and smart cards, application servers and peers. An essential feature of Co-Sec is the use of smart cards as a secure token. This Convergence token provides sensitive security functions on a tamper-resistant device. The chapter first introduces the concepts and the architecture of the security infrastructure. Based on a description of the basic cryptographic primitives, as well as of the advanced cryptographic schemes applied by the project, we describe the high-level security functions provided for the Convergence middleware and network layer.

References

  1. Allison B. Lewko, Brent Waters: Decentralizing Attribute-Based Encryption. EUROCRYPT 2011: 568–588.Google Scholar
  2. Anadiotis A. C., Castro H., Charalampos P., Chiariglione L., Corlan L., Detti A., Gkonis P., Huebner T., Melazzi N. B., Mousas A., Ribas J., Salsano S., Sequeira D., Tanase M., Tropea G. (2011). Report: System Architecture. Convergence (D3.3).Google Scholar
  3. Benoît Libert, Damien Vergnaud: Group Signatures with Verifier-Local Revo-cation and Backward Unlinkability in the Standard Model. CANS 2009: 498–517.Google Scholar
  4. Carlisle Adams, Steve Lloyd, (1999): Understanding the public –key infrastructure. [cited 2013 May 15].Google Scholar
  5. Crowd sourced. Phishing OAuth 2 [cited 2012 Nov 22]. Available online at: http://en.wikipedia.org/wiki/Phishing.
  6. Dan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41–55.Google Scholar
  7. David Galindo, Flavio D. Garcia: A Schnorr-Like Lightweight Identity-Based Signature Scheme. AFRICACRYPT 2009: 135–148.Google Scholar
  8. Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy: Efficient and Robust Pseudonymous Authentication in VANET. In Proceedings of the ACM International Workshop on Vehicular Ad Hoc Networks 2007.Google Scholar
  9. John Bethencourt, Amit Sahai, Brent Waters: Ciphertext-Policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy 2007: 321–334.Google Scholar
  10. Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer: An Application of the Boneh and Shacham Group Signature Scheme to Biometric Au-thentication. IWSEC 2008: 219–230. Google Scholar
  11. Luther Martin: Introduction to Identity-Based Encryption. Artech House, 2008.Google Scholar
  12. OAuth Consortium. OAuth Documentation. OAuth 2 [cited 2012 Nov 21]. Available online at: http://oauth.net/documentation/.

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  • Thomas Huebner
    • 1
  • Andreas Kohlos
    • 1
  • Amit Shrestha
    • 1
  • Carsten Rust
    • 1
  1. 1.Morpho CardsPaderbornGermany

Personalised recommendations