Abstract
This chapter describes the Convergence security infrastructure. The core component for Convergence Security (CoSec) has a distributed architecture. It encompasses subcomponents on different computing platforms such as client computers and smart cards, application servers and peers. An essential feature of Co-Sec is the use of smart cards as a secure token. This Convergence token provides sensitive security functions on a tamper-resistant device. The chapter first introduces the concepts and the architecture of the security infrastructure. Based on a description of the basic cryptographic primitives, as well as of the advanced cryptographic schemes applied by the project, we describe the high-level security functions provided for the Convergence middleware and network layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Allison B. Lewko, Brent Waters: Decentralizing Attribute-Based Encryption. EUROCRYPT 2011: 568–588.
Anadiotis A. C., Castro H., Charalampos P., Chiariglione L., Corlan L., Detti A., Gkonis P., Huebner T., Melazzi N. B., Mousas A., Ribas J., Salsano S., Sequeira D., Tanase M., Tropea G. (2011). Report: System Architecture. Convergence (D3.3).
Benoît Libert, Damien Vergnaud: Group Signatures with Verifier-Local Revo-cation and Backward Unlinkability in the Standard Model. CANS 2009: 498–517.
Carlisle Adams, Steve Lloyd, (1999): Understanding the public –key infrastructure. [cited 2013 May 15].
Crowd sourced. Phishing OAuth 2 [cited 2012 Nov 22]. Available online at: http://en.wikipedia.org/wiki/Phishing.
Dan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41–55.
David Galindo, Flavio D. Garcia: A Schnorr-Like Lightweight Identity-Based Signature Scheme. AFRICACRYPT 2009: 135–148.
Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy: Efficient and Robust Pseudonymous Authentication in VANET. In Proceedings of the ACM International Workshop on Vehicular Ad Hoc Networks 2007.
John Bethencourt, Amit Sahai, Brent Waters: Ciphertext-Policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy 2007: 321–334.
Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer: An Application of the Boneh and Shacham Group Signature Scheme to Biometric Au-thentication. IWSEC 2008: 219–230.
Luther Martin: Introduction to Identity-Based Encryption. Artech House, 2008.
OAuth Consortium. OAuth Documentation. OAuth 2 [cited 2012 Nov 21]. Available online at: http://oauth.net/documentation/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag London
About this chapter
Cite this chapter
Huebner, T., Kohlos, A., Shrestha, A., Rust, C. (2014). The CONVERGENCE Security Infrastructure. In: Almeida, F., Andrade, M., Blefari Melazzi, N., Walker, R., Hussmann, H., Venieris, I. (eds) Enhancing the Internet with the CONVERGENCE System. Signals and Communication Technology. Springer, London. https://doi.org/10.1007/978-1-4471-5373-3_6
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5373-3_6
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5372-6
Online ISBN: 978-1-4471-5373-3
eBook Packages: EngineeringEngineering (R0)