By Topic

Trustworthy Computing under Resource Constraints with the DOWN Policy

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Ramkumar, M. ; Mississippi State Univ., Starkville

Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a serious limiting factor. However, inexpensive trustworthy computers are required for many evolving application scenarios. The problem of realizing inexpensive ScPs for large-scale networks consisting of low-complexity devices have not received adequate consideration thus far. We introduce two strategies toward realizing low-cost ScPs. The first is the decrypt only when necessary (DOWN) policy, which can substantially improve the ability of low-cost ScPs to protect their secrets. The DOWN policy relies on the ability to operate with fractional parts of secrets. Taking full advantage of the DOWN policy requires consideration of the nature of computations performed with secrets and even the mechanisms employed for distribution of secrets. We discuss the feasibility of extending the DOWN policy to various asymmetric and symmetric cryptographic primitives. The second is cryptographic authentication strategies which employ only symmetric cryptographic primitives, based on novel ID-based key predistribution schemes that demand very low complexity of operations to be performed by the ScP and can take good advantage of the DOWN policy.

Published in:

Dependable and Secure Computing, IEEE Transactions on  (Volume:5 ,  Issue: 1 )