Threshold Things That Think: Authorisation for Resharing

Roel Peeters, Markulf Kohlweiss, Bart Preneel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
Original languageEnglish
Title of host publicationiNetSec 2009 - Open Research Problems in Network Security
PublisherSpringer
Pages111-124
Number of pages14
ISBN (Electronic)978-3-642-05437-2
ISBN (Print)978-3-642-05436-5
DOIs
Publication statusPublished - 2009
EventOpen Research Problems in Network Security - IFIP WG 11.4 International Workshop - Zurich, Switzerland
Duration: 23 Apr 200924 Apr 2009

Publication series

NameIFIP Advances in Information and Communication Technology
Volume309

Conference

ConferenceOpen Research Problems in Network Security - IFIP WG 11.4 International Workshop
Abbreviated titleiNetSec 2009
Country/TerritorySwitzerland
CityZurich
Period23/04/0924/04/09

Fingerprint

Dive into the research topics of 'Threshold Things That Think: Authorisation for Resharing'. Together they form a unique fingerprint.

Cite this