Theft-Protected Proprietary Certificates
نویسندگان
چکیده
The notion of proprietary certificates [7] was recently introduced in an attempt to discourage sharing of access rights to subscription-based resources. A proprietary certificate is a certificate on a public key – the so-called proprietary key – that contains some information related to another (so-called collateral) certificate and has the property that if the owner of the proprietary public key reveals the corresponding (so-called proprietary) secret key, then the collateral secret key (corresponding to the public key in the collateral certificate) is automatically released. Thus, if a service provider requires all users to use proprietary certificates linked with collateral certificates corresponding to resources the users always wish to keep private – such as access to 401(k) accounts, the user’s criminal history, etc – then this will discourage the access rights sharing. However, the original solution for proprietary certificates overlooks the possibility of accidental sharing, namely, sharing caused by theft of the proprietary secret key which would lead to immediate loss of the collateral secret key, making wide-scale deployment of proprietary certificate approach unlikely. In this paper we discuss what steps can be taken towards making proprietary certificates approach more practical. While our solution preserves all the properties the original solution of [7] achieves, most importantly, protection against intentional rights sharing, it satisfies an additional property, namely, theft protection.
منابع مشابه
Efficient Proprietary Certification Process and Secured Theft-Protected Proprietary Certificates
This paper presents a new simple scheme for theft-protected proprietary certificate problem by introducing a mobile phone as an additional requirement for the proprietor and this scheme is analyzed to be more secured than the one presented by M. Jakobsson, et al. Secondly we present the proprietary certification process using Elliptic Curve Discrete Log Problem (ECDLP) instead of Discrete Log P...
متن کاملProprietary Certificates ( Extended Abstract )
Certificates play an essential role in public-key cryptography, and are likely to become a cornerstone of commerce-related applications. Traditional certificates, however, are not secure against certificate lending, i.e., a situation in which a certificate holder voluntarily shares with others the rights bestowed upon him through a certificate. This type of abuse is a concern in several types o...
متن کاملPoster: Security Analysis of HSTS Implementation in Browsers
Currently, HTTP Strict Transport Security, used to harden HTTPS, has gained increasing adoption in browsers and servers. We conduct an in-depth empirical security study of HSTS implementation in browsers, then successfully discover several new flaws in storage implementation and interaction with certificates. These flaws enable cookies theft, DoS, and bypassing problems. Moreover, we point out ...
متن کاملEnterprise Digital Rights Management:Solutions against Information Theft by Insiders
Insider attack is one of the most serious cybersecurity threats to corporate America. Among all insider threats, information theft is considered the most damaging in terms of potential financial loss. Moreover, it is also especially difficult to detect and prevent, because in many cases the attacker has the proper authority to access the stolen information. Enterprise Digital Rights Management ...
متن کاملIdentity Theft through the Web
In the physical world, an individual’s identity is verified by legal documents including passports, driver’s licenses, birth certificates, and identification cards. Identity can also be authenticated by biological features (such as fingerprints or DNA) or demonstration of secret knowledge (passwords). Naturally, online identities can not rely on physical evidence. Instead, online identities are...
متن کامل