2010
DOI: 10.1007/978-3-642-16441-5_9
|View full text |Cite
|
Sign up to set email alerts
|

On Device Identity Establishment and Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2010
2010
2013
2013

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(22 citation statements)
references
References 9 publications
0
6
0
1
Order By: Relevance
“…Gennaro et al [9] establish a condition for tamperproofness of general hardware and give some clues on how to check device integrity by means of cryptographic chal-lenges.Öksüzoglu and Wallach [19] present, in VoteBox Nano, an elegant human-verifiable software and firmware (FPGA bitstreams) checking mechanism based on random "session identifiers", which change every time the DRE is rebooted. Gallo et al [8] generalize Gennaro et al's conditions, prototyping a human-readable, cryptographicallystrong system verification method called Time-Base One-Time Verification (TOTV), which allows for multiple device verification in a trust amplifying fashion, making humans part of the verification protocol. Although both [19,8] can be used by poll workers and party advocates to assert DRE integrity, they are not practical for large-scale verification by voters, as they require comparison of multiple digit verification numbers, a hindrance when illiterate voters are considered.…”
Section: Dre System Verificationmentioning
confidence: 99%
See 4 more Smart Citations
“…Gennaro et al [9] establish a condition for tamperproofness of general hardware and give some clues on how to check device integrity by means of cryptographic chal-lenges.Öksüzoglu and Wallach [19] present, in VoteBox Nano, an elegant human-verifiable software and firmware (FPGA bitstreams) checking mechanism based on random "session identifiers", which change every time the DRE is rebooted. Gallo et al [8] generalize Gennaro et al's conditions, prototyping a human-readable, cryptographicallystrong system verification method called Time-Base One-Time Verification (TOTV), which allows for multiple device verification in a trust amplifying fashion, making humans part of the verification protocol. Although both [19,8] can be used by poll workers and party advocates to assert DRE integrity, they are not practical for large-scale verification by voters, as they require comparison of multiple digit verification numbers, a hindrance when illiterate voters are considered.…”
Section: Dre System Verificationmentioning
confidence: 99%
“…Gallo et al [8] generalize Gennaro et al's conditions, prototyping a human-readable, cryptographicallystrong system verification method called Time-Base One-Time Verification (TOTV), which allows for multiple device verification in a trust amplifying fashion, making humans part of the verification protocol. Although both [19,8] can be used by poll workers and party advocates to assert DRE integrity, they are not practical for large-scale verification by voters, as they require comparison of multiple digit verification numbers, a hindrance when illiterate voters are considered.…”
Section: Dre System Verificationmentioning
confidence: 99%
See 3 more Smart Citations