Sender optimal, breach-resilient, and post-quantum secure cryptographic methods and systems for digital auditing

作者: Attila Altay Yavuz

DOI:

关键词:

摘要: Cryptographic techniques referred to as Sender Optimal, Breach-resilient Auditing with Post-Quantum security (SOBAP) are described. Optimal efficiency and post-quantum of symmetric key based achieved, while providing compromise-resiliency, conditional non-repudiation, fault-tolerance verification in a distributed setting. SOBAP relies on any choice primitive extended features (e.g., forward-security, append-only authentication), which can be optimally efficient. The is done via the execution F secure multi-party computation (SMPC) technique, wherein an honest majority guarantees non-repudiation fault-tolerance. offers architecture that uses authenticated access control data structures ensure policy enforcement. also primitives SMPC. Extensions offer oblivious enhancements hardware support.

参考文章(48)
Mohammad Etemad, Alptekin Küpçü, Database Outsourcing with Hierarchical Authenticated Data Structures international conference on information security and cryptology. pp. 381- 399 ,(2013) , 10.1007/978-3-319-12160-4_23
Vadim Lyubashevsky, Lattice Signatures without Trapdoors Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 738- 755 ,(2012) , 10.1007/978-3-642-29011-4_43
Scott A. Crosby, Dan S. Wallach, Efficient data structures for tamper-evident logging usenix security symposium. pp. 317- 334 ,(2009)
Daniel J. Bernstein, Tanja Lange, Post Quantum Cryptography Nature. ,vol. 549, pp. 188- 194 ,(2008) , 10.1038/NATURE23461
Shweta Agrawal, Dan Boneh, Homomorphic MACs: MAC-Based Integrity for Network Coding Applied Cryptography and Network Security. pp. 292- 305 ,(2009) , 10.1007/978-3-642-01957-9_18
Michel Abdalla, Leonid Reyzin, A New Forward-Secure Digital Signature Scheme international conference on the theory and application of cryptology and information security. pp. 116- 129 ,(2000) , 10.1007/3-540-44448-3_10
Darren Davis, Fabian Monrose, Michael K. Reiter, Time-Scoped Searching of Encrypted Audit Logs international conference on information and communication security. pp. 532- 545 ,(2004) , 10.1007/978-3-540-30191-2_41
Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila, Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem 2015 IEEE Symposium on Security and Privacy. pp. 553- 570 ,(2015) , 10.1109/SP.2015.40
Dan Boneh, Ben Lynn, Hovav Shacham, Short Signatures from the Weil Pairing international conference on the theory and application of cryptology and information security. pp. 514- 532 ,(2001) , 10.1007/3-540-45682-1_30
Emil Stefanov, Dawn Song, Elaine Shi, Towards Practical Oblivious RAM arXiv: Cryptography and Security. ,(2011)