Multifactor authenticated key renewal

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Establishing secure channels is one of the most important and fundamental trust issues in information security. It is of high important not only for servers and users computers but also for global connectivity among any kind of network devices. Most existing technologies for establishing secure channels are based on asymmetric cryptography which requires heavy computations, large memory and complicated supporting mechanism such as PKI. In this paper, we consider the setting of authentication with small devices possibly held by humans and possibly embedded in a semi secure environment. We propose a authenticated key renewal protocol which uses only symmetric cryptography. The protocol takes into account other factors important for embedded and human held network devices: It covers multi-factor authentication to take advantage of secrets possessed by the secure device as well as the memorable password of the device owner. The protocol can, further, allow partial leakage of stored secret from a secure device. The protocol's considerations are a good demonstration of designing "trusted procedure" in the highly constrained environment of mobile and embedded small devices which is expected to be prevalent in the coming years. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Matsuo, S., Moriyama, D., & Yung, M. (2012). Multifactor authenticated key renewal. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7222 LNCS, pp. 204–220). https://doi.org/10.1007/978-3-642-32298-3_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free