A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini


The KIPS Transactions:PartC, Vol. 13, No. 1, pp. 27-34, Feb. 2006
10.3745/KIPSTC.2006.13.1.27,   PDF Download:

Abstract

In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend on a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without knowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data(e.g., digital signatures) without keeping the private key in the mobile device.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. P. Yang and K. H. Rhee, "A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini," The KIPS Transactions:PartC, vol. 13, no. 1, pp. 27-34, 2006. DOI: 10.3745/KIPSTC.2006.13.1.27.

[ACM Style]
Jong Phil Yang and Kyung Hyune Rhee. 2006. A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini. The KIPS Transactions:PartC, 13, 1, (2006), 27-34. DOI: 10.3745/KIPSTC.2006.13.1.27.