Privacy Enhancements for Hardware-Based Security Modules

被引:0
|
作者
Pasupathinathan, Vijayakrishnan [1 ]
Pieprzyk, Josef [1 ]
Wang, Huaxiong [2 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
[2] Nanyang Technol Univ, Div Sci Mat, Singapore 639798, Singapore
来源
E-BUSINESS AND TELECOMMUNICATIONS | 2011年 / 130卷
基金
澳大利亚研究理事会;
关键词
Pseudonyms; Anonymity; Hardware-based security; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
  • [21] Hardware-based Cyber Threats
    Alves, Thiago
    Morris, Thomas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 259 - 266
  • [22] Dynamic Function Verification for System on Chip Security Against Hardware-Based Attacks
    Kim, Lok-Won
    Villasenor, John D.
    IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (04) : 1229 - 1242
  • [23] Boundary Scan Security Enhancements for a Cryptographic Hardware
    Nikodem, Maciej
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 91 - 97
  • [24] A novel trusted hardware-based scalable security framework for IoT edge devices
    Khan M.
    Hatami M.
    Zhao W.
    Chen Y.
    Discover Internet of Things, 2024, 4 (01):
  • [25] Enhancements for Hardware-based IEEE802.1CB embedded in Automotive Gateway System-on-Chip
    Marino, Angela Gonzalez
    Kane, Abdoul Aziz
    Fons, Francesc
    Moreno Arostegui, Juan Manuel
    PROCEEDINGS OF THE 2021 SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS '21), 2021, : 31 - 37
  • [26] Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks
    Kim, Lok-Won
    Villasenor, John D.
    IEEE TRANSACTIONS ON RELIABILITY, 2014, 63 (02) : 661 - 675
  • [27] Algorithms for hardware-based pattern recognition
    Lohweg, Volker
    Diederichs, Carsten
    Müller, Dietmar
    Eurasip Journal on Applied Signal Processing, 2004, 2004 (12): : 1912 - 1920
  • [28] Secure production within the iiot - hardware-based security solutions protect data and systems
    Pollmann M.
    Pollmann, Malte, 1600, Carl Hanser Verlag (112): : 257 - 260
  • [29] Flexible Hardware-Based Stereo Matching
    Ambrosch, Kristian
    Kubinger, Wilfried
    Humenberger, Martin
    Steininger, Andreas
    EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2008, (01)
  • [30] Hardware-based networking widens the pipes
    Ortiz, S
    COMPUTER, 1998, 31 (05) : 8 - 9