Accelerated remotely keyed encryption

9Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the encryption is done on a fast untrusted device, such as the smartcard’s host. This paper describes an new scheme, the length-preserving “accelerated remotely keyed" (ARK) encryption scheme and, in a formal model, provides a proof of security. For the sake of practical usability, our model avoids asymptotics. Blaze, Feigenbaum, and Naor gave a general definition for secure RKESs [3]. Compared to their length-preserving scheme, the ARK scheme is more efficient but satisfies the same security requirements.

Cite

CITATION STYLE

APA

Lucks, S. (1999). Accelerated remotely keyed encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1636, pp. 112–123). Springer Verlag. https://doi.org/10.1007/3-540-48519-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free