首页> 外文会议>International Conference on Trusted Systems >Two-Head Dragon Protocol: Preventing Cloning of Signature Keys Work in Progress
【24h】

Two-Head Dragon Protocol: Preventing Cloning of Signature Keys Work in Progress

机译:双头龙议定书:防止签名键的克隆在进行中

获取原文

摘要

Cryptographic techniques based on possession of private keys rely very much on the assumption that the private keys can be used only by the key's owner. As contemporary architectures of operating systems do not provide such a guarantee, special devices such as smart cards and TPM modules are intended to serve as secure storage for such keys. When carefully designed, these devices can be examined and certified as secure devices for holding private keys. However, this approach has a serious drawback: certification procedure is expensive, requires very specialized knowledge and its result cannot be verified independently by an end-user. On the other hand, malicious cryptography techniques can be used to circumvent the security mechanisms installed in a device. Moreover, in practice we often are forced to retreat to solutions such as generation of the private keys outside secure devices. In this case we are forced to trust blindly the parties providing such services. We propose an architecture for electronic signatures and signature creation devices such that in case of key leakage, any use of leaked keys will be detected with a fairly high probability. The main idea is that using the private keys outside the legitimate place leads to disclosure of these keys preventing any claims of validity of signatures in any thinkable legal situation. Our approach is stronger than fail-stop signatures. Indeed, fail-stop signatures protect against derivation of keys via cryptanalysis of public keys, but cannot do anything about key leakage or making a copy of the key by a service provider that generates the key pairs for the clients. Our approach is a simple alternative to the usual attempts to make cryptographic cards and TPM as tamper resistant as possible, that is, to solve the problem alone by hardware means. It also addresses the question of using private keys stored in not highly secure environment without a dramatic redesign of operating systems. It can be used as a stand alone solution, or just as an additional mechanism for building trust of an end-user.
机译:基于私钥密钥的加密技术非常依赖于假设私钥只能由关键的所有者使用。随着当代的操作系统架构不提供这样的保证,诸如智能卡和TPM模块等特殊设备旨在充当这种键的安全存储。精心设计时,可以检查和认证这些设备作为保存私钥的安全设备。但是,这种方法具有严重缺陷:认证程序昂贵,需要非常专业知识,其结果无法通过最终用户独立验证。另一方面,恶意加密技术可用于规避设备中安装的安全机制。此外,在实践中,我们经常被迫向解决方案退回,例如在安全设备外的私钥的生成。在这种情况下,我们被迫盲目地信任提供此类服务的各方。我们提出了一种用于电子签名和签名创建设备的架构,使得在密钥泄漏的情况下,将以相当高的概率检测泄漏键的任何使用。主要思想是,在合法地区以外的私人钥匙导致披露这些密钥,防止任何思想的法律情况下签名的任何有效性。我们的方法比失败停止签名强。实际上,失败停止签名通过公钥的密码分析来保护键的推导,但不能对键泄漏或制作一个服务提供商的键的副本,该服务提供商为客户端生成密钥对。我们的方法是一种简单的替代方案,通常尝试将加密卡和TPM作为尽可能篡改,即通过硬件装置独自解决问题。它还解决了使用存储在不高度安全环境中的私钥的问题,而无需急需操作系统。它可以用作独立的解决方案,或者作为建立最终用户的信任的额外机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号