Abstract
A portable device carries important secrets in encrypted form; to unlock it, a threshold secret sharing scheme is used, requiring the presence of several other devices. We explore the design space for the protocol through which these devices communicate wirelessly, under the additional constraint that eavesdroppers should not be able to recognize and track the user carrying these devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled Physical Random Functions. In: ACSAC 2002: Proceedings of the 18th Annual Computer Security Applications Conference, p. 149. IEEE Computer Society, Washington, DC (2002) ISBN 0-7695-1828-1
Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: Proc. IEEE SECURECOMM 2005, pp. 67–73 (2005), http://www.cl.cam.ac.uk/~mgk25/sc2005-distance.pdf
Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001)
Kuhn, M.: The TrustNo 1 Cryptoprocessor Concept (1997) (manuscript), http://www.cl.cam.ac.uk/~mgk25/trustno1.pdf
Müller, T., Freiling, F.C., Dewald, A.: TRESOR Runs Encryption Securely Outside RAM. In: USENIX Security Symposium. USENIX Association (2011), http://www.usenix.org/event/sec11/tech/full_papers/Muller.pdf
Peeters, R.: Security Architecture for Things That Think. Ph.D. thesis, KU Leuven (June 2012), http://www.cosic.esat.kuleuven.be/publications/thesis-202.pdf
Rutkowska, J.: Why do I miss Microsoft BitLocker? (2009), http://theinvisiblethings.blogspot.co.uk/2009/01/why-do-i-miss-microsoft-bitlocker.html
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979), http://securespeech.cs.cmu.edu/reports/shamirturing.pdf
Stajano, F.: Security for Ubiquitous Computing. Wiley (2002) ISBN 0-470-84493-0
Stajano, F.: Pico: No More Passwords! In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011), http://www.cl.cam.ac.uk/~fms27/papers/2011-Stajano-pico.pdf
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000), http://www.cl.cam.ac.uk/~fms27/papers/1999-StajanoAnd-duckling.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stannard, O., Stajano, F. (2012). Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-35694-0_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35693-3
Online ISBN: 978-3-642-35694-0
eBook Packages: Computer ScienceComputer Science (R0)