Threshold things that think: Authorisation for resharing

7Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user. © IFIP International Federation for Information Processing 2009.

Cite

CITATION STYLE

APA

Peeters, R., Kohlweiss, M., & Preneel, B. (2009). Threshold things that think: Authorisation for resharing. In IFIP Advances in Information and Communication Technology (Vol. 309, pp. 111–124). Springer New York LLC. https://doi.org/10.1007/978-3-642-05437-2_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free