Privacy enhancements for hardware-based security modules

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2011) Privacy enhancements for hardware-based security modules. In Obaidat, Mohammad S. & Filipe, Joaquim (Eds.) e-Business and Telecommunications. Springer Berlin Heidelberg, pp. 224-236.

View at publisher


The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks.

In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.

Impact and interest:

0 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 70095
Item Type: Book Chapter
Additional Information: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers
Keywords: Pseudonyms, Anonymity, Hardware-based security
DOI: 10.1007/978-3-642-20077-9_16
ISBN: 9783642200762
ISSN: 1865-0929
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2011 Springer Berlin Heidelberg
Deposited On: 11 Apr 2014 03:25
Last Modified: 26 Oct 2015 16:02

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page