A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints

@article{Chen2016AHE,
  title={A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints},
  author={Chunlu Chen and Hiroaki Anada and Junpei Kawamoto and Kouichi Sakurai},
  journal={J. Internet Serv. Inf. Secur.},
  year={2016},
  volume={6},
  pages={23-36}
}
Internet service has enabled digital contents to be shared faster and easier, but on the other side it raised an issue of illegal copy of the digital contents. Public key encryption schemes solve this issue partially. However, there is still a weak point that the secret key is not completely protected; that is, public key encryption schemes suffer from illegal copy of secret keys (the key-cloning problem). In this paper, first, we discuss the usability of terminal fingerprints for key-cloning… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-3 of 3 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 22 references

Current status and issues of web browser fingerprinting

T. Saito, K. Takasu, +5 authors K. Takahashi
In Proc. of the 2015 Computer Security Symposium, • 2015
View 1 Excerpt

Fingerprinting guidance for web specification authors

N. Doty
Unofficial Draft • 2015
View 1 Excerpt

An analysis of private browsing modes in modern browsers

G.A.E. Bursztein, C. Jackson, D. Boneh
In Proc. of the 19th USENIX Security Symposium (Security’10), • 2010
View 1 Excerpt

How Unique Is Your Web Browser?

Privacy Enhancing Technologies • 2010
View 1 Excerpt

Similar Papers

Loading similar papers…