[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sigg et al., 2012 - Google Patents

Pintext: A framework for secure communication based on context

Sigg et al., 2012

View PDF
Document ID
8078696646980661550
Author
Sigg S
Schuermann D
Ji Y
Publication year
Publication venue
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers 8

External Links

Snippet

We propose a framework for secure device-pairing based on contextual information. In contrast to related work, we utilise fuzzy cryptography schemes to establish a common secret among devices and to account for noise in the contextual features. The framework is …
Continue reading at eudl.eu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals

Similar Documents

Publication Publication Date Title
Fomichev et al. Survey and systematization of secure device pairing
US11669465B1 (en) Secure storage of data through a multifaceted security scheme
Sigg et al. Pintext: A framework for secure communication based on context
US12041189B2 (en) Method for storing and recovering key for blockchain-based system, and device therefor
RU2433560C2 (en) Checking synchronisation for device authentication
Farb et al. Safeslinger: easy-to-use and secure public-key exchange
Liu et al. A novel asymmetric three-party based authentication scheme in wearable devices environment
Zhu et al. Fairness-aware and privacy-preserving friend matching protocol in mobile social networks
Jiang et al. Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices
KR20160035999A (en) Method, Apparatus and System of Security of Data Communication
US11057196B2 (en) Establishing shared key data for wireless pairing
Gaebel et al. Looks good to me: Authentication for augmented reality
Zenger et al. Exploiting the physical environment for securing the internet of things
Mayrhofer et al. Adversary models for mobile device authentication
Haataja et al. Bluetooth security attacks: comparative analysis, attacks, and countermeasures
US20180035293A1 (en) Authenticating a device utilizing a secure display
Hu et al. Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
Xu et al. Inaudiblekey: Generic inaudible acoustic signal based key agreement protocol for mobile devices
Goodrich et al. Using audio in secure device pairing
CN109246110A (en) data sharing method and device
Gu et al. Scalable group audio-based authentication scheme for IoT devices
US9949122B2 (en) Challenge-response-test image to phone for secure pairing
US20240305450A1 (en) Authentication system for a multiuser device
TW201319860A (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
Sigg Context-based security: State of the art, open research topics and a case study