Skip to main content

Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 448))

Abstract

Mobility of users and information is an important feature of IT systems that must be considered during design of sensitive information protection mechanisms. This paper describes an architecture of MobInfoSec system for sharing documents with sensitive information using fine-grained access rules described by general access structures. However, the proper usage of general access structures requires trusted components and strong authentication protocols. They allow to establish secure communication channels between different system components. In the paper we propose a conference protocol based on Boyd’s ideas with key transport and key establishment mechanisms. We show that the protocol achieves three goals: (a) the key and participants’ mutual authentication, (b) the common secure communication channel, and (c) the personal secure communication channels between the protocol initializer and other protocol participants.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hyla, T., Pejaś, J., El Fray, I., Maćków, W., Chocianowicz, W., Szulga, M.: Sensitive Information Protection on Mobile Devices Using General Access Structures. In: The Ninth International Conference on Systems, ICONS 2014, pp. 192–196. IARIA (2014)

    Google Scholar 

  2. Hyla, T., Pejaś, J.: A practical certificate and identity based encryption scheme and related security architecture. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 190–205. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. CEN, prEN 14890-1: Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services (2012)

    Google Scholar 

  4. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)

    Book  Google Scholar 

  5. Dong, L., Chen, K.: Cryptographic Protocol Security Analysis Based on Trusted Freshness. Springer, Heidelberg (2012)

    Book  MATH  Google Scholar 

  6. Lim, C.H., Lee, P.J.: Several practical protocols for authentication and key exchange. Information Processing Letters 53, 91–96 (1995)

    Article  MATH  Google Scholar 

  7. Boyd, C., González Nieto, J.M.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Chen, Y.-Y., Lee, R.B.: Hardware-Assisted Application-Level Access Control. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 363–378. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Hyla, T., Pejaś, J.: Certificate-Based Encryption Scheme with General Access Structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 41–55. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. ISO/IEC 11770-3:2008 Information technology – Security techniques – Key management – Part 3: Mechanisms using asymmetric techniques (2008)

    Google Scholar 

  11. Matsuo, S., Miyazaki, K., Otsuka, A., Basin, D.: How to Evaluate the Security of Real-Life Cryptographic Protocols? In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 182–194. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Ryan, P.Y.A., Schneider, S.A., Goldsmith, M.H., Lowe, G., Roscoe, A.W.: The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley (2001)

    Google Scholar 

  13. Basin, D.M., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. International Journal of Information Security 4(3), 181–208 (2005)

    Article  Google Scholar 

  14. Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Blanchet, B.: A computationally sound mechanized prover for security protocols. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 140–154 (2006)

    Google Scholar 

  16. Kurkowski, M., Penczek, W.: Verifying Security Protocols Modeled by Networks of Automata. Fundamenta Informaticae 79(3-4), 453–471 (2007)

    MATH  MathSciNet  Google Scholar 

  17. Kurkowski, M., Siedlecka-Lamch, O., Szymoniak, S., Piech, H.: Parallel Bounded Model Checking of Security Protocols. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2013, Part I. LNCS, vol. 8384, pp. 224–234. Springer, Heidelberg (2013)

    Google Scholar 

  18. Siedlecka-Lamch, O., et al.: A New Effective Approach for Modelling and Verification of Security Protocols. In: Proc. of CS&P 2012, pp. 191–202. Humboldt University Press, Berlin (2012)

    Google Scholar 

  19. Kurkowski, M.: Mobile device to protect classified information (MobInfoSec). Task 3: Protocols for authentication and information security. Part 2: Formal analysis of cryptographic authentication protocols. Technical Report, TR/ZUT WI KIO ZOI 0003.02/2014, West Pomeranian University of Technology in Szczecin, Poland (2014) (in Polish)

    Google Scholar 

  20. Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Transactions on Information Theory 29, 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

El Fray, I., Hyla, T., Kurkowski, M., Maćków, W., Pejaś, J. (2014). Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44893-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44892-2

  • Online ISBN: 978-3-662-44893-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics