Privacy Enhancements for Hardware-Based Security Modules

被引:0
|
作者
Pasupathinathan, Vijayakrishnan [1 ]
Pieprzyk, Josef [1 ]
Wang, Huaxiong [2 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
[2] Nanyang Technol Univ, Div Sci Mat, Singapore 639798, Singapore
来源
E-BUSINESS AND TELECOMMUNICATIONS | 2011年 / 130卷
基金
澳大利亚研究理事会;
关键词
Pseudonyms; Anonymity; Hardware-based security; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
引用
收藏
页码:224 / +
页数:3
相关论文
共 50 条
  • [41] Algorithms for hardware-based pattern recognition
    Lohweg, V
    Diederichs, C
    Müller, D
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004, 2004 (12) : 1912 - 1920
  • [42] Optimization Strategies for Hardware-Based Cofactorization
    Loebenberger, Daniel
    Putzka, Jens
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 170 - +
  • [43] Algorithms for Hardware-Based Pattern Recognition
    Volker Lohweg
    Carsten Diederichs
    Dietmar Müller
    EURASIP Journal on Advances in Signal Processing, 2004
  • [44] Gamifying the Project in Hardware-based Courses
    Ristov, Sasko
    Ackovska, Nevena
    Kirandziska, Vesna
    INTERNATIONAL JOURNAL OF ENGINEERING PEDAGOGY, 2015, 5 (04): : 4 - 11
  • [45] Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
    Sokolov, Alexander N.
    Barinov, Andrey E.
    Antyasov, Ivan S.
    Skurlaev, Sergey V.
    Ufimtcev, Maxim S.
    Luzhnov, Vasiliy S.
    2018 GLOBAL SMART INDUSTRY CONFERENCE (GLOSIC), 2018,
  • [46] HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security
    Ngo, Duc-Minh
    Lightbody, Dominic
    Temko, Andriy
    Pham-Quoc, Cuong
    Tran, Ngoc-Thinh
    Murphy, Colin C. C.
    Popovici, Emanuel
    FUTURE INTERNET, 2023, 15 (01)
  • [47] Creating hardware-based primitives that facilitate the exposure of state information useful for security related monitoring
    Mott, Stephen
    Williams, Paul
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 163 - 170
  • [48] Hardware-Based Performance Enhancement Guaranteed Caches
    Huangfu, Yijie
    Zhang, Wei
    2015 IEEE 18TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC), 2015, : 166 - 173
  • [49] A dynamically reconfigurable hardware-based cipher chip
    Mitsuyama, Y
    Andales, Z
    Onoye, T
    Shirakawa, I
    PROCEEDINGS OF THE ASP-DAC 2001: ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE 2001, 2001, : 11 - 12
  • [50] A DSP hardware-based laboratory for signals and systems
    Huettel, Lisa G.
    2006 IEEE 12th Digital Signal Processing Workshop & 4th IEEE Signal Processing Education Workshop, Vols 1 and 2, 2006, : 456 - 459