Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 3295148, 12 pages
https://doi.org/10.1155/2018/3295148
Research Article

Multidevice Authentication with Strong Privacy Protection

Brno University of Technology, Czech Republic

Correspondence should be addressed to Jan Hajny; zc.rbtuv.ceef@ynjah

Received 12 April 2018; Revised 20 June 2018; Accepted 3 July 2018; Published 29 July 2018

Academic Editor: Kim-Kwang Raymond Choo

Copyright © 2018 Jan Hajny et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Xu, “Mobile applications based on smart wearable devices,” in Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, pp. 505-506, Republic of Korea, November 2015. View at Scopus
  2. NIST. Federal information processing standards publication (FIPS 197). Advanced Encryption Standard (AES), 2001.
  3. N. Courtois, K. Nohl, and S. ONeil, Algebraic attacks on the crypto-1 stream cipher in mifare classic and oyster cards, IACR Cryptology ePrint Archive, 2008.
  4. N. T. Courtois, “The dark side of security by obscurity: And cloning MiFare classic rail and building passes, anywhere, anytime,” in Proceedings of the SECRYPT 2009 - International Conference on Security and Cryptography, pp. 331–338, Italy, October 2009. View at Scopus
  5. F. D. Garcia, P. Van Rossum, R. Verdult, and R. W. Schreur, “Wirelessly pickpocketing a Mifare Classic card,” in Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 3–15, USA, May 2009. View at Scopus
  6. C. Paquin, “U-prove cryptographic specification v1.1,” Technical report, 2011. View at Google Scholar
  7. O. Riva, C. Qin, K. Strauss, and D. Lymberopoulos, “Progressive authentication: Deciding when to authenticate on mobile phones,” in In USENIX Security Symposium, pp. 301–316, 2012.
  8. V. S. Miller, “The Weil pairing, and its efficient calculation,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 17, no. 4, pp. 235–261, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  9. W. Mostowski and P. Vullers, “Efficient U-prove implementation for anonymous credentials on smart cards,” Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 96, pp. 243–260, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Vullers and G. Alpár, “Efficient Selective Disclosure on Smart Cards Using Idemix,” in Policies and Research in Identity Management, vol. 396 of IFIP Advances in Information and Communication Technology, pp. 53–67, Springer, Berlin, Heidelberg, 2013. View at Publisher · View at Google Scholar
  11. D. Oswald and C. Paar, “Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world,” in Cryptographic Hardware and Embedded Systems–CHES 2011, vol. 6917, pp. 207–222, 2011. View at Google Scholar · View at Scopus
  12. J. Camenisch and E. V. Herreweghen, “Design and implementation of the idemix anonymous credential system,” in Proceedings of the 9th ACM Conference on Computer and Communications Security CCS ’02, pp. 21–30, ACM, New York, NY, USA, November 2002. View at Scopus
  13. S. Micali and C.-P. Schnorr, “Efficient, perfect polynomial random number generators,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 3, no. 3, pp. 157–172, 1991. View at Publisher · View at Google Scholar · View at MathSciNet
  14. J. Hajny and L. Malina, “Unlinkable attribute-based credentials with practical revocation on smart-cards,” in Smart Card Research and Advanced Applications - CARDIS, S. Mangard, Ed., vol. 7771 of Lecture Notes in Computer Science, pp. 62–76, Springer, Berlin, Heidelberg, 2013. View at Publisher · View at Google Scholar
  15. NIST. Federal information processing standards publication (FIPS 46-3). Data Encryption Standard (DES), 1999.
  16. J. Hajny, L. Malina, and O. Tethal, “Privacy-Friendly Access Control Based on Personal Attributes,” in Proceedings of the The 9th International Workshop on Security, vol. 8639 of Lecture Notes in Computer Science, pp. 1–16, Springer International Publishing. View at Publisher · View at Google Scholar
  17. https://srlabs.de/analyzing-legic-prime-rfids/.
  18. B.-R. Cha, S.-H. Lee, S.-B. Park, and Y.-K. Ji, “Design of micro-payment to strengthen security by 2 factor authentication with mobile wearable devices,” Advanced Science and Technology Letters (ASTL), vol. 109, no. 7, pp. 28–32, 2015. View at Google Scholar
  19. I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, “Cloud-centric multi-level authentication as a service for secure public safety device networks,” IEEE Communications Magazine, vol. 54, no. 4, pp. 47–53, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Gonzalez-Manzano, J. d. Fuentes, and A. Orfila, “Access Control for the Cloud Based on Multi-device Authentication,” in Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 856–863, Helsinki, Finland, August 2015. View at Publisher · View at Google Scholar
  21. J. Hajny, P. Dzurenda, and L. Malina, “Multi-device authentication using wearables and iot,” in In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016, pp. 483–488, SCITEPRESS - Science and Technology Publications, Lda, Portugal, 2016.
  22. E. Brickell, J. Camenisch, and L. Chen, “Direct anonymous attestation,” in Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), pp. 132–145, ACM, New York, NY, USA, 2004. View at Publisher · View at Google Scholar
  23. P. Bichsel, J. Camenisch, T. Groß, and V. Shoup, “Anonymous credentials on a standard Java card,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS'09, pp. 600–610, New York, NY, USA, November 2009. View at Scopus
  24. J. Camenisch, M. Drijvers, and J. Hajny, “Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs,” in Proceedings of the 15th ACM Workshop on Privacy in the Electronic Society, WPES 2016, pp. 123–133, New York, NY, USA, 2016. View at Scopus
  25. J. Camenisch and M. Stadler, “Efficient group signature schemes for large groups,” in Advances in Cryptology — CRYPTO '97, vol. 1294 of Lecture Notes in Computer Science, pp. 410–424, Springer Berlin Heidelberg, Berlin, Heidelberg, 1997. View at Publisher · View at Google Scholar
  26. R. Cramer, Modular Design of Secure Yet Practical Cryptographic Protocols, Universiteit van Amsterdam, 1997.
  27. The White House. National strategy for trusted identities in cyberspace, 2011. http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf.
  28. S. D. Galbraith, K. Harrison, and D. Soldera, “Implementing the tate pairing,” in Algorithmic Number Theory, C. Fieker and D. R. Kohel, Eds., pp. 324–337, Springer, Berlin, Heidelberg, 2002. View at Google Scholar
  29. I. Naumann and G. Hogben, “Enisa: Privacy features of eid cards,” Network Security Newslette, vol. 2008, no. 8, pp. 9–13, 2008. View at Google Scholar · View at Scopus
  30. D. Boneh and X. Boyen, “Short signatures without random oracles,” in Advances in Cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 56–73, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  31. E. Barker, “Recommendation for key management part 1: General (revision 4),” in NIST Special Publication Part 1, vol. 800 (57), pp. 1–147, 2016. View at Google Scholar
  32. M. Meriac, “Heart of darkness-exploring the uncharted backwaters of hid iclasstm security,” Heart, 2010. View at Google Scholar
  33. A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), IEEE, pp. 850–855, Kerkyra, Corfu, Greece, July 2011. View at Publisher · View at Google Scholar · View at Scopus