Privacy Enhancements for Hardware-Based Security Modules

被引:0
|
作者
Pasupathinathan, Vijayakrishnan [1 ]
Pieprzyk, Josef [1 ]
Wang, Huaxiong [2 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
[2] Nanyang Technol Univ, Div Sci Mat, Singapore 639798, Singapore
来源
E-BUSINESS AND TELECOMMUNICATIONS | 2011年 / 130卷
基金
澳大利亚研究理事会;
关键词
Pseudonyms; Anonymity; Hardware-based security; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
  • [31] Impact of Emerging Hardware on Security and Privacy
    Jaeger, Trent
    Kang, Brent ByungHoon
    Mentens, Nele
    Sturton, Cynthia
    IEEE SECURITY & PRIVACY, 2023, 21 (03) : 6 - 7
  • [32] Hardware security for software privacy support
    Gilmont, T
    Legat, JD
    Quisquater, JJ
    ELECTRONICS LETTERS, 1999, 35 (24) : 2096 - 2098
  • [33] Latest Trends in Hardware Security and Privacy
    Di Natale, Giorgio
    Regazzoni, Francesco
    Albanese, Vincent
    Lhermet, Frank
    Loisel, Yann
    Sensaoui, Abderrahmane
    Pagliarini, Samuel
    2020 33RD IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT), 2020,
  • [34] Hardware Security and Privacy: Threats and Opportunities
    John, Lizy Kurian
    IEEE MICRO, 2023, 43 (05) : 4 - 5
  • [35] Plugging hardware-based compression into a server
    不详
    EDN, 2007, 52 (24) : 30 - 30
  • [36] Research on hardware-based genetic algorithms
    Zhong, Guo-An
    Jin, Dong-Ming
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2000, 28 (11): : 72 - 76
  • [37] REFINEMENTS FOR HARDWARE-BASED LOGIC SIMULATION
    ROSE, C
    ELECTRONIC ENGINEERING, 1989, 61 (753): : 91 - &
  • [38] Hardware-based pointer data prefetcher
    Lai, SC
    Lu, SL
    21ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, PROCEEDINGS, 2003, : 290 - 298
  • [39] Accurate hardware-based stereo vision
    Ambrosch, Karina
    Kubinger, Wilfried
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2010, 114 (11) : 1303 - 1316
  • [40] A Case for Hardware-Based Demand Paging
    Lee, Gyusun
    Jin, Wenjing
    Song, Wonsuk
    Gong, Jeonghun
    Bae, Jonghyun
    Ham, Tae Jun
    Lee, Jae W.
    Jeong, Jinkyu
    2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020), 2020, : 1103 - 1116