@inproceedings{4a79f411551144a1b27ca6ecee697400,
title = "Threshold Things That Think: Authorisation for Resharing",
abstract = "As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.",
author = "Roel Peeters and Markulf Kohlweiss and Bart Preneel",
year = "2009",
doi = "10.1007/978-3-642-05437-2_11",
language = "English",
isbn = "978-3-642-05436-5",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer",
pages = "111--124",
booktitle = "iNetSec 2009 - Open Research Problems in Network Security",
address = "United Kingdom",
note = "Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2009 ; Conference date: 23-04-2009 Through 24-04-2009",
}