Learn More
In developing secure applications and systems, the designers often must incorpomte secure user identifi­ cation in the design specification. In this paper, we study secure off-line authenticated user identification schemes based on a biometric system that can measure a user's biometric accumtely (up to some Hamming distance). The schemes presented here(More)
We address the problem of allowing authorized users, who have yet to establish a secret key, to <i>securely</i> and <i>efficiently</i> exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. This problem was first introduced by Strasser, P&#246;pper, &#268;apkun, and &#268;agalj in their recent(More)
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods efficiently identify non-trivial numbers of invalid signatures in batches of (potentially large) numbers of signatures. Our methods use " divide-and-conquer " search to identify the(More)
We address the problem of allowing authorized users, who do not preshare a common key, to effectively exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. In this work, we jointly consider the security and efficiency of key exchange protocols, focusing on the interplay between message(More)
This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The method more efficiently identifies non-trivial numbers, w, of invalid signatures in constrained sized, N , batches than previously published methods, and does not require that the verifier(More)
This paper explores some of the many issues in developing security enhanced versions of MPI. The problems that arise in creating a security enhanced MPI for embedded real-time systems supporting the Department of Defense's Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the(More)