Sigg et al., 2012 - Google Patents
Pintext: A framework for secure communication based on contextSigg et al., 2012
View PDF- Document ID
- 8078696646980661550
- Author
- Sigg S
- Schuermann D
- Ji Y
- Publication year
- Publication venue
- Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers 8
External Links
Snippet
We propose a framework for secure device-pairing based on contextual information. In contrast to related work, we utilise fuzzy cryptography schemes to establish a common secret among devices and to account for noise in the contextual features. The framework is …
- 238000004891 communication 0 title description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fomichev et al. | Survey and systematization of secure device pairing | |
US11669465B1 (en) | Secure storage of data through a multifaceted security scheme | |
Sigg et al. | Pintext: A framework for secure communication based on context | |
US12041189B2 (en) | Method for storing and recovering key for blockchain-based system, and device therefor | |
RU2433560C2 (en) | Checking synchronisation for device authentication | |
Farb et al. | Safeslinger: easy-to-use and secure public-key exchange | |
Liu et al. | A novel asymmetric three-party based authentication scheme in wearable devices environment | |
Zhu et al. | Fairness-aware and privacy-preserving friend matching protocol in mobile social networks | |
Jiang et al. | Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices | |
KR20160035999A (en) | Method, Apparatus and System of Security of Data Communication | |
US11057196B2 (en) | Establishing shared key data for wireless pairing | |
Gaebel et al. | Looks good to me: Authentication for augmented reality | |
Zenger et al. | Exploiting the physical environment for securing the internet of things | |
Mayrhofer et al. | Adversary models for mobile device authentication | |
Haataja et al. | Bluetooth security attacks: comparative analysis, attacks, and countermeasures | |
US20180035293A1 (en) | Authenticating a device utilizing a secure display | |
Hu et al. | Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context | |
Xu et al. | Inaudiblekey: Generic inaudible acoustic signal based key agreement protocol for mobile devices | |
Goodrich et al. | Using audio in secure device pairing | |
CN109246110A (en) | data sharing method and device | |
Gu et al. | Scalable group audio-based authentication scheme for IoT devices | |
US9949122B2 (en) | Challenge-response-test image to phone for secure pairing | |
US20240305450A1 (en) | Authentication system for a multiuser device | |
TW201319860A (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
Sigg | Context-based security: State of the art, open research topics and a case study |