Skip to main content

Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices

  • Conference paper
Book cover Security Protocols XX (Security Protocols 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7622))

Included in the following conference series:

Abstract

A portable device carries important secrets in encrypted form; to unlock it, a threshold secret sharing scheme is used, requiring the presence of several other devices. We explore the design space for the protocol through which these devices communicate wirelessly, under the additional constraint that eavesdroppers should not be able to recognize and track the user carrying these devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  2. Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled Physical Random Functions. In: ACSAC 2002: Proceedings of the 18th Annual Computer Security Applications Conference, p. 149. IEEE Computer Society, Washington, DC (2002) ISBN 0-7695-1828-1

    Chapter  Google Scholar 

  3. Hancke, G.P., Kuhn, M.G.: An RFID Distance Bounding Protocol. In: Proc. IEEE SECURECOMM 2005, pp. 67–73 (2005), http://www.cl.cam.ac.uk/~mgk25/sc2005-distance.pdf

  4. Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Kuhn, M.: The TrustNo 1 Cryptoprocessor Concept (1997) (manuscript), http://www.cl.cam.ac.uk/~mgk25/trustno1.pdf

  6. Müller, T., Freiling, F.C., Dewald, A.: TRESOR Runs Encryption Securely Outside RAM. In: USENIX Security Symposium. USENIX Association (2011), http://www.usenix.org/event/sec11/tech/full_papers/Muller.pdf

  7. Peeters, R.: Security Architecture for Things That Think. Ph.D. thesis, KU Leuven (June 2012), http://www.cosic.esat.kuleuven.be/publications/thesis-202.pdf

  8. Rutkowska, J.: Why do I miss Microsoft BitLocker? (2009), http://theinvisiblethings.blogspot.co.uk/2009/01/why-do-i-miss-microsoft-bitlocker.html

  9. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979), http://securespeech.cs.cmu.edu/reports/shamirturing.pdf

    Article  MathSciNet  MATH  Google Scholar 

  10. Stajano, F.: Security for Ubiquitous Computing. Wiley (2002) ISBN 0-470-84493-0

    Google Scholar 

  11. Stajano, F.: Pico: No More Passwords! In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011), http://www.cl.cam.ac.uk/~fms27/papers/2011-Stajano-pico.pdf

    Chapter  Google Scholar 

  12. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000), http://www.cl.cam.ac.uk/~fms27/papers/1999-StajanoAnd-duckling.pdf

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stannard, O., Stajano, F. (2012). Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35694-0_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35693-3

  • Online ISBN: 978-3-642-35694-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics