Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Equipping smart devices with public key signatures
Ding X., Mazzocchi D., Tsudik G. ACM Transactions on Internet Technology7 (1):3-es,2007.Type:Article
Date Reviewed: Jul 30 2007

This is a detailed and highly technical discussion of a proposed security solution for portable devices such as personal digital assistants and mobile telephones. It appears to be aimed at designers of software for such devices.

The paper begins with a description of the problem to be addressed: portable devices are becoming more numerous and are being used for more critical functions, but they lack the computing resources to support the increasingly sophisticated algorithms necessary for security and integrity. It goes on to describe in detail, with formal proofs, the authors’ proposed solution to the problem.

The solution is to use partially trusted security mediators to handle the computing-intensive part of signature generation. The paper explores the practical and theoretical implications of the proposed solution.

The existing body of knowledge on which this paper is based is detailed. The academic style of referencing is used. Footnotes are used sparingly throughout. At about 25 pages, the paper is long enough to adequately cover the material. Because of its technical nature and detailed description, it is not light reading.

In summary, this work represents a significant contribution to the existing body of knowledge in an important and emerging area. It is recommended reading for those involved in developing software for portable devices.

Reviewer:  Neil D. Burgess Review #: CR134576 (0807-0696)
Bookmark and Share
  Featured Reviewer  
 
Public Key Cryptosystems (E.3 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy