Online Public Key Cryptographic Scheme For Data Security In Bridge Health Monitoring

Abstract the paper proposes an online-public-key cryptographic scheme for data security in bridge health monitoring. The scheme solves the problem such as how to preserve and manipulate the users’ private key securely. Meanwhile, it realizes the mutual authentication between user and server, in which the private key splitting method is proven to be secure in the RO model. The analysis shows that the scheme is able to resist the normal attacks such as the denial of service or the off-line password guess effectively. It has strong robustness in applications.

[1]  Taekyoung Kwon,et al.  Robust Software Tokens - Yet Another Method for Securing User's Digital Identity , 2003, ACISP.

[2]  Douglas N. Hoover,et al.  Software smart cards via cryptographic camouflage , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[3]  Dan Boneh,et al.  Fine-grained control of security capabilities , 2004, TOIT.

[4]  Dan Boneh,et al.  A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.

[5]  Michael K. Reiter,et al.  Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.

[6]  Burton S. Kaliski,et al.  Server-assisted generation of a strong secret from a password , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[7]  Thomas Wu,et al.  The SRP Authentication and Key Exchange System , 2000, RFC.

[8]  Mihir Bellare,et al.  The Security of Practical Two-Party RSA Signature Schemes , 2001, IACR Cryptol. ePrint Arch..