The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security of many cryptographic protocols is conditioned by the quality of the random elements generated in the course of the protocol execution. On the other hand, cryptographic devices implementing these protocols are designed given technical limitations, usability requirements and cost constraints. This frequently results in a black box solution. Unfortunately, black box random number generators...
Mobile devices have gained immense popularity, and every day two million people use them both for private and professional reasons. Users turn to them for more and more sophisticated tasks, including financial operations, e-mail or personal and corporate data management. In this paper, we raise the subject of user awareness and education in the area of security for mobile devices. In order to do this,...
The application of modern electronic identity documents is not limited to local authentication, but they can be used to remotely access online services. In order to protect user's activities in different services, a pseudonymous identification system must be used. Standard cryptographic primitives are to complex for embedded devices, thus the restricted identification protocol was proposed in the...
We present a cryptographic approach to local self-organization in ad hoc systems such as virtual traffic lights. The cryptographic layer enables conversion of randomized self-organization into a deterministic setting in which it is not only possible to detect misconduct, but also prove it against third parties at a later time. Our main contribution is providing a high level of privacy protection –...
One of the major inventions of the new personal identity cards in Germany is supporting anonymous authentication. The Restricted Identification protocol enables to authenticate in an unlimited number of domains with passwords created with strong asymmetric cryptography and not using the insecure login-password mechanism. Moreover, the RI scheme guarantees unlinkability of user's authentication in...
The most valuable element of biometric security systems are the personal features of its users. Characteristics of individuals are unique and must be protected. We focus in this paper on methods of protection of user identity in systems based on keystroking. Our approach assumes giving minimal information to adversaries and the best responsiveness of the system regardless of user representation or...
We present a Anonymous Mutual Authentication (AMA) protocol for authentication and key agreement between cryptographic devices. It is an alternative for Terminal Authentication (TA) plus Chip Authentication (ChA) developed for electronic travel documents. Unlike conventional TA, executing AMA does not provide any digital record that could be used as a proof against third parties that an interaction...
We present a variant of the protocol stack for anonymous authentication implemented in German personal identity documents. We strengthen the system by eliminating group keys - a potential target of attack for a powerful adversary aiming to undermine Restricted Identification mechanisms. We provide a mechanism of authentication that merges Chip Authentication protocol with Restricted Identification.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.