Threat Model. Within the KSS, the KSMS, the CM and the PL are considered honest-but-curious entities. They will perform the protocol honestly, but they are curious to extract private information about users. Owners are passive adver- saries while consumers and outsiders may be malicious. The car’s OBU is trusted and equipped with a Hardware Security Module (HSM) [34, 45] that supports secure key storage and cryptographic operations such as symmetric and public- key encryption, following the EVITA [17] and PRESERVE [34] specifications. Users’ PDs are untrusted as they can get stolen, lost or broken.
Appears in 1 contract
Sources: End User Agreement
Threat Model. Within the KSS, the KSMS, the CM and the PL are considered honest-but-curious entities. They will perform the protocol honestly, but they are curious to extract private information about users. Owners are passive adver- saries while consumers and outsiders may be malicious. The car’s OBU is trusted and equipped with a Hardware Security Module (HSM) [34, 45] that supports secure key storage and cryptographic operations such as symmetric and public- key encryption, following the EVITA [17] and PRESERVE [34] specificationsspecifications. Users’ PDs are untrusted as they can get stolen, lost or broken.
Appears in 1 contract
Sources: End User Agreement