Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
スポンサーリンク
概要
- 論文の詳細を見る
In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication.In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.
- 電子情報通信学会の論文
- 2010-05-01
著者
-
KATO KAZUHIKO
University of Tsukuba
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol. (jaist)
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol.
関連論文
- Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
- Live-upgrading hypervisors: a study in its applications (システムソフトウェアとオペレーティング・システム)
- Anomaly Detection Using Integration Model of Vector Space and Network Representation(Network Security)
- A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics
- Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
- Consideration of Lightweight Chameleon Hash Function (2)
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Anomaly Detection Using Integration Model of Vector Space and Network Representation
- Anomaly Detection Using Integration Model of Vector Space and Network Representation
- Methods for Restricting Message Space in Public-Key Encryption
- Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing
- Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing