作者: Attila Altay Yavuz
DOI:
关键词:
摘要: Cryptographic techniques referred to as Sender Optimal, Breach-resilient Auditing with Post-Quantum security (SOBAP) are described. Optimal efficiency and post-quantum of symmetric key based achieved, while providing compromise-resiliency, conditional non-repudiation, fault-tolerance verification in a distributed setting. SOBAP relies on any choice primitive extended features (e.g., forward-security, append-only authentication), which can be optimally efficient. The is done via the execution F secure multi-party computation (SMPC) technique, wherein an honest majority guarantees non-repudiation fault-tolerance. offers architecture that uses authenticated access control data structures ensure policy enforcement. also primitives SMPC. Extensions offer oblivious enhancements hardware support.