“…Previous work on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform [4] or to offload the processing of sensitive information [2,8,11], and the use of lightweight cryptosystems such as Hierarchical Identity-based Encryption (HIBE) to protect kiosk user data [1,7,9]. Unfortunately, challenges posed by rural kiosks, specifically (a) the absence of specialized hardware features such as Trusted Platform Modules (TPMs) [15] or a modifiable BIOS in older recycled PCs, (b) the potential use of DTN, (c) the absence of a production-ready implementation of HIBE and (d) the limited availability of smartphones in most developing regions make these approaches difficult, if not impossible, to implement in our scenario.…”