Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices

  • Oliver Stannard
  • Frank Stajano
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7622)


A portable device carries important secrets in encrypted form; to unlock it, a threshold secret sharing scheme is used, requiring the presence of several other devices. We explore the design space for the protocol through which these devices communicate wirelessly, under the additional constraint that eavesdroppers should not be able to recognize and track the user carrying these devices.


Shared Secret Security Protocol Trust Platform Module USENIX Security Symposium Countdown Timer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)MathSciNetzbMATHCrossRefGoogle Scholar
  2. 2.
    Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled Physical Random Functions. In: ACSAC 2002: Proceedings of the 18th Annual Computer Security Applications Conference, p. 149. IEEE Computer Society, Washington, DC (2002) ISBN 0-7695-1828-1CrossRefGoogle Scholar
  3. 3.
    Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: Proc. IEEE SECURECOMM 2005, pp. 67–73 (2005),
  4. 4.
    Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Kuhn, M.: The TrustNo 1 Cryptoprocessor Concept (1997) (manuscript),
  6. 6.
    Müller, T., Freiling, F.C., Dewald, A.: TRESOR Runs Encryption Securely Outside RAM. In: USENIX Security Symposium. USENIX Association (2011),
  7. 7.
    Peeters, R.: Security Architecture for Things That Think. Ph.D. thesis, KU Leuven (June 2012),
  8. 8.
    Rutkowska, J.: Why do I miss Microsoft BitLocker? (2009),
  9. 9.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979), MathSciNetzbMATHCrossRefGoogle Scholar
  10. 10.
    Stajano, F.: Security for Ubiquitous Computing. Wiley (2002) ISBN 0-470-84493-0Google Scholar
  11. 11.
    Stajano, F.: Pico: No More Passwords! In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011), CrossRefGoogle Scholar
  12. 12.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000), CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Oliver Stannard
    • 1
  • Frank Stajano
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUnited Kingdom

Personalised recommendations