Title :
Secure Generation of Digital Signature on Compromised Computer
Author :
Tanaka, Hideaki ; Sasaki, Shoichi ; Echizen, Isao ; Yoshiura, Hiroshi
Author_Institution :
Univ. of Electro-Commun., Tokyo
Abstract :
Although digital signatures are the basic elements of security-sensitive systems, the host computers that generate them are usually connected to the Internet and are constantly at risk of intrusion. The worst possible situation is when an intruder generates a user´s legitimate signature against the user´s intension. Therefore, unintended digital signatures must never be generated, even when the host computers have been compromised. In this paper, two conditions, i.e., secure confirmation of the target data and secure activation of the signature process, are presented for ensuring this type of security. The paper describes a new signature system that meets these conditions by using virtual machines, a tamper-resistant module, and a cryptographic protocol. The proposed system is as secure as the underlying virtual machine monitor.
Keywords :
cryptographic protocols; digital signatures; virtual machines; Internet; cryptographic protocol; digital signature; host computers; legitimate signature; security-sensitive systems; tamper-resistant module; virtual machine monitor; Computer hacking; Cryptographic protocols; Cryptography; Data security; Digital signatures; Informatics; Internet; Transmission line measurements; Virtual machine monitors; Virtual machining;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on
Conference_Location :
Kaohsiung
Print_ISBN :
978-0-7695-2994-1
DOI :
10.1109/IIH-MSP.2007.276