首页 > 最新文献

Int. J. Appl. Cryptogr.最新文献

英文 中文
Secure offline superdistribution for mobile platforms 确保移动平台线下超级分销
Pub Date : 2009-08-01 DOI: 10.1504/IJACT.2009.028026
M. Wolf, A. Osterhues, Christian Stüble
Superdistribution and other peer-to-peer (P2P) distribution schemes like sharing or rental offer a flexible and user-friendly way to distribute digital content. However, the parties involved have different interests (e.g. user privacy vs. license enforcement) that should be reflected in the underlying security architecture. We identify characteristic P2P scenarios and demonstrate how these can be realised by applying a few basic licensing operations. We then present a security architecture to realise these basic license operations (1) in a generalised fashion and (2) employing the ARM TrustZone technology, which will be used in many future mobile platforms. Further, we extend existing superdistribution schemes for offline application, allowing a mobile peer to access superdistributed content without the need to first contact the actual licenser.
超级分发和其他点对点(P2P)分发方案,如共享或租赁,提供了一种灵活且用户友好的方式来分发数字内容。然而,所涉及的各方有不同的利益(例如,用户隐私与许可证执行),这应该反映在底层安全体系结构中。我们确定了典型的P2P场景,并演示了如何通过应用一些基本的许可操作来实现这些场景。然后,我们提出了一个安全架构来实现这些基本的许可操作(1)以一种通用的方式和(2)采用ARM TrustZone技术,该技术将用于许多未来的移动平台。此外,我们将现有的超级分发方案扩展到离线应用程序,允许移动对等体访问超级分发的内容,而无需首先联系实际的许可方。
{"title":"Secure offline superdistribution for mobile platforms","authors":"M. Wolf, A. Osterhues, Christian Stüble","doi":"10.1504/IJACT.2009.028026","DOIUrl":"https://doi.org/10.1504/IJACT.2009.028026","url":null,"abstract":"Superdistribution and other peer-to-peer (P2P) distribution schemes like sharing or rental offer a flexible and user-friendly way to distribute digital content. However, the parties involved have different interests (e.g. user privacy vs. license enforcement) that should be reflected in the underlying security architecture. We identify characteristic P2P scenarios and demonstrate how these can be realised by applying a few basic licensing operations. We then present a security architecture to realise these basic license operations (1) in a generalised fashion and (2) employing the ARM TrustZone technology, which will be used in many future mobile platforms. Further, we extend existing superdistribution schemes for offline application, allowing a mobile peer to access superdistributed content without the need to first contact the actual licenser.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127208727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-aware provably secure protocols for browser-based mutual authentication 用户感知的可证明的安全协议,用于基于浏览器的相互认证
Pub Date : 2009-08-01 DOI: 10.1504/IJACT.2009.028028
S. Gajek, M. Manulis, Jörg Schwenk
The standard solution for mutual authentication between human users and servers on the internet is to execute a transport layer security (TLS) handshake during which the server authenticates using a X.509 certificate followed by the authentication of the user either with own password or with some cookie stored within the user's browser. However, poor ability of human users to validate X.509 certificates allows for various forms of (social) impersonation attacks. In this paper, we introduce human perceptible authentication (HPA) as a concept for the secure user-aware authentication of servers via recognisable authenticators such as images, video or audio sequences. We formally specify HPA within a security model for browser-based mutual authentication; for this, we extend the traditional Bellare-Rogaway model to deal with human users as inherent protocol participants. Using HPA and the classical TLS handshake, we furthermore design two efficient provably secure password- and cookie-authentication protocols.
internet上人类用户和服务器之间相互认证的标准解决方案是执行传输层安全(TLS)握手,在此期间,服务器使用X.509证书进行身份验证,然后使用用户自己的密码或存储在用户浏览器中的某些cookie进行身份验证。然而,由于人类用户验证X.509证书的能力较差,因此有可能出现各种形式的(社会)模拟攻击。在本文中,我们引入了人类感知认证(HPA)作为一个概念,通过可识别的认证器(如图像、视频或音频序列)对服务器进行安全的用户感知认证。我们在基于浏览器的相互认证的安全模型中正式指定HPA;为此,我们扩展了传统的Bellare-Rogaway模型,将人类用户作为固有的协议参与者来处理。利用HPA和经典的TLS握手协议,我们进一步设计了两种高效的可证明安全的密码认证协议和cookie认证协议。
{"title":"User-aware provably secure protocols for browser-based mutual authentication","authors":"S. Gajek, M. Manulis, Jörg Schwenk","doi":"10.1504/IJACT.2009.028028","DOIUrl":"https://doi.org/10.1504/IJACT.2009.028028","url":null,"abstract":"The standard solution for mutual authentication between human users and servers on the internet is to execute a transport layer security (TLS) handshake during which the server authenticates using a X.509 certificate followed by the authentication of the user either with own password or with some cookie stored within the user's browser. However, poor ability of human users to validate X.509 certificates allows for various forms of (social) impersonation attacks. In this paper, we introduce human perceptible authentication (HPA) as a concept for the secure user-aware authentication of servers via recognisable authenticators such as images, video or audio sequences. We formally specify HPA within a security model for browser-based mutual authentication; for this, we extend the traditional Bellare-Rogaway model to deal with human users as inherent protocol participants. Using HPA and the classical TLS handshake, we furthermore design two efficient provably secure password- and cookie-authentication protocols.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A correction to 'efficient and secure comparison for on-line auctions' 对“在线拍卖的有效和安全比较”的修正
Pub Date : 2009-08-01 DOI: 10.1504/IJACT.2009.028031
I. Damgård, M. Geisler, Mikkel Krøigaard
In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure without it.
在本文中,我们描述了对Damgard等人提出的密码系统的一种修正。应用密码学,Vol. 1, No. 1。虽然修正很小,不会影响Damgard等人的协议的性能,但它是必要的,因为没有它,密码系统就不安全。
{"title":"A correction to 'efficient and secure comparison for on-line auctions'","authors":"I. Damgård, M. Geisler, Mikkel Krøigaard","doi":"10.1504/IJACT.2009.028031","DOIUrl":"https://doi.org/10.1504/IJACT.2009.028031","url":null,"abstract":"In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure without it.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131381013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
Multiuser private queries over encrypted databases 加密数据库上的多用户私有查询
Pub Date : 2009-08-01 DOI: 10.1504/IJACT.2009.028029
Yanjiang Yang, F. Bao, Xuhua Ding, R. Deng
Searchable encryption schemes allow users to perform keyword-based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically study searchable encryption in a practical multiuser setting. Our results include a set of security notions for multiuser searchable encryption as well as a construction which is provably secure under the newly introduced security notions. We also discuss how to improve query efficiency.
可搜索的加密方案允许用户在加密数据库上执行基于关键字的搜索。几乎所有现有的此类方案都只考虑单个用户同时充当数据所有者和查询者的场景。然而,实际上大多数数据库并不只为一个用户服务;相反,它们支持多个用户的搜索和写入操作。在本文中,我们系统地研究了一个实际的多用户设置下的可搜索加密。我们的结果包括一组多用户可搜索加密的安全概念,以及在新引入的安全概念下可证明安全的构造。我们还讨论了如何提高查询效率。
{"title":"Multiuser private queries over encrypted databases","authors":"Yanjiang Yang, F. Bao, Xuhua Ding, R. Deng","doi":"10.1504/IJACT.2009.028029","DOIUrl":"https://doi.org/10.1504/IJACT.2009.028029","url":null,"abstract":"Searchable encryption schemes allow users to perform keyword-based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically study searchable encryption in a practical multiuser setting. Our results include a set of security notions for multiuser searchable encryption as well as a construction which is provably secure under the newly introduced security notions. We also discuss how to improve query efficiency.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130925776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Efficient robust private set intersection 高效鲁棒私有集交
Pub Date : 2009-05-16 DOI: 10.1504/IJACT.2012.048080
D. Dachman-Soled, T. Malkin, Mariana Raykova, M. Yung
Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first solution to this problem is presented.
在互不信任的双方之间秘密高效地计算集交集是私有数据挖掘领域的一个重要基础步骤。确保鲁棒性,即在保持协议效率(而不是采用昂贵的通用技术)的同时,应对潜在的任意行为不当(即恶意)的各方,是一个悬而未决的问题。本文提出了该问题的第一个解决方案。
{"title":"Efficient robust private set intersection","authors":"D. Dachman-Soled, T. Malkin, Mariana Raykova, M. Yung","doi":"10.1504/IJACT.2012.048080","DOIUrl":"https://doi.org/10.1504/IJACT.2012.048080","url":null,"abstract":"Computing Set Intersection privately and efficiently between two mutually mistrusting parties is an important basic procedure in the area of private data mining. Assuring robustness, namely, coping with potentially arbitrarily misbehaving (i.e., malicious) parties, while retaining protocol efficiency (rather than employing costly generic techniques) is an open problem. In this work the first solution to this problem is presented.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"51 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 208
A multidimensional linear distinguishing attack on the Shannon cipher 香农密码的多维线性区分攻击
Pub Date : 2009-02-01 DOI: 10.1504/IJACT.2009.023463
Risto M. Hakala, K. Nyberg
In this article, we present a linear distinguishing attack on the stream cipher Shannon. Our distinguisher can distinguish the output keystream of Shannon from about 2107 keystream words while using an array of 232 counters. The distinguisher makes use of a multidimensional linear transformation instead of a 1D transformation, which is traditionally used in linear distinguishing attacks. This gives a clear improvement to the keystream requirement: we need approximately 25 times less keystream than when a 1D transformation is used. In addition, we give evidence of the correctness of the distinguisher by applying it to a smaller version of Shannon.
本文提出了一种针对流密码香农的线性识别攻击方法。我们的区分器可以在使用232个计数器的数组时,从大约2107个关键字中区分香农的输出关键字流。该区分器使用了多维线性变换,而不是传统上用于线性区分攻击的一维变换。这对密钥流要求有了明显的改进:我们需要的密钥流比使用一维变换时少大约25倍。此外,我们通过将其应用于Shannon的一个较小版本来证明区分符的正确性。
{"title":"A multidimensional linear distinguishing attack on the Shannon cipher","authors":"Risto M. Hakala, K. Nyberg","doi":"10.1504/IJACT.2009.023463","DOIUrl":"https://doi.org/10.1504/IJACT.2009.023463","url":null,"abstract":"In this article, we present a linear distinguishing attack on the stream cipher Shannon. Our distinguisher can distinguish the output keystream of Shannon from about 2107 keystream words while using an array of 232 counters. The distinguisher makes use of a multidimensional linear transformation instead of a 1D transformation, which is traditionally used in linear distinguishing attacks. This gives a clear improvement to the keystream requirement: we need approximately 25 times less keystream than when a 1D transformation is used. In addition, we give evidence of the correctness of the distinguisher by applying it to a smaller version of Shannon.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A critical analysis and improvement of advanced access content system drive-host authentication 高级访问内容系统驱动-主机认证的关键分析与改进
Pub Date : 2009-02-01 DOI: 10.1504/IJACT.2009.023464
Jiayuan Sui, Douglas R Stinson
This article presents a critical analysis of the Advanced Access Content System drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications (based on the ISO and the SIGMA protocols) of the scheme are suggested in order to provide better security. A proof of security of the modified scheme based on the ISO protocol is also presented. The modified schemes achieve better efficiency than the original scheme.
本文对高级访问内容系统驱动器-主机身份验证方案进行了关键分析。确定了一些可能导致对该方案进行各种攻击的弱点。特别是,我们观察到该方案容易受到未知密钥共享和中间人攻击。为了提供更好的安全性,建议对该方案进行修改(基于ISO和SIGMA协议)。并给出了基于ISO协议的改进方案的安全性证明。改进后的方案比原方案具有更高的效率。
{"title":"A critical analysis and improvement of advanced access content system drive-host authentication","authors":"Jiayuan Sui, Douglas R Stinson","doi":"10.1504/IJACT.2009.023464","DOIUrl":"https://doi.org/10.1504/IJACT.2009.023464","url":null,"abstract":"This article presents a critical analysis of the Advanced Access Content System drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications (based on the ISO and the SIGMA protocols) of the scheme are suggested in order to provide better security. A proof of security of the modified scheme based on the ISO protocol is also presented. The modified schemes achieve better efficiency than the original scheme.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121488653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unconditionally secure disjointness tests for private datasets 私有数据集的无条件安全不相交测试
Pub Date : 2009-02-01 DOI: 10.1504/IJACT.2009.023471
Qingsong Ye, Huaxiong Wang, J. Pieprzyk, Xian-Mo Zhang
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
给出了两个用于私有集不相交检验的无条件安全协议。为了提供我们协议的直观,我们给出了一个应用Sylvester矩阵的朴素示例。不幸的是,这个简单的构造是不安全的,因为它揭示了关于交集基数的信息。更具体地说,它公开了它的下界。通过使用拉格朗日插值,我们为诚实但好奇的情况提供了一个协议,而不透露任何额外的信息。最后,我们描述了一种针对恶意对手的安全协议。在该协议中,应用验证测试来检测行为不端的参与者。这两个协议都需要O(1)轮通信。我们的协议在通信和计算开销方面比以前的协议更有效。与以往协议的安全性依赖于计算假设不同,我们的协议提供了信息理论上的安全性。据我们所知,我们的协议是第一个没有通用安全功能评估的协议。更重要的是,它们是在恶意对手情况下进行私有脱节测试的最有效协议。
{"title":"Unconditionally secure disjointness tests for private datasets","authors":"Qingsong Ye, Huaxiong Wang, J. Pieprzyk, Xian-Mo Zhang","doi":"10.1504/IJACT.2009.023471","DOIUrl":"https://doi.org/10.1504/IJACT.2009.023471","url":null,"abstract":"We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
One-round key exchange in the standard model 标准模型中的一轮密钥交换
Pub Date : 2009-02-01 DOI: 10.1504/IJACT.2009.023466
C. Boyd, Y. Cliff, J. G. Nieto, K. Paterson
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how Key-Encapsulation Mechanisms (KEMs) can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the Random Oracle Model.
我们认为一轮密钥交换协议在标准模型中是安全的。安全性分析使用了Canetti和Krawczyk强大的安全性模型,并将其自然扩展到基于id的设置。本文展示了如何以一种通用的方式使用密钥封装机制(Key-Encapsulation Mechanisms, kem)来获得两种不同的协议设计,这些协议设计具有越来越强的安全保证。详细分析了协议的性能;令人惊讶的是,当使用特定的KEM结构实例化时,生成的协议与之前仅在随机Oracle模型中有证明的最佳方案竞争。
{"title":"One-round key exchange in the standard model","authors":"C. Boyd, Y. Cliff, J. G. Nieto, K. Paterson","doi":"10.1504/IJACT.2009.023466","DOIUrl":"https://doi.org/10.1504/IJACT.2009.023466","url":null,"abstract":"We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how Key-Encapsulation Mechanisms (KEMs) can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the Random Oracle Model.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Securing group key exchange against strong corruptions and key registration attacks 保护组密钥交换免受严重损坏和密钥注册攻击
Pub Date : 2008-11-01 DOI: 10.1504/IJACT.2008.021083
E. Bresson, M. Manulis
In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task – the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stronger attacks against honest, but 'opened' users. Further, we define strong security goals for GKE protocols in the presence of such powerful adversaries and propose a 3-round GKE protocol, named TDH1, which remains immune to their attacks under standard cryptographic assumptions. Our security definitions allow adversaries to register users and specify their long-lived keys, thus, in particular capture attacks of malicious insiders for the appropriate security goals such as Mutual Authentication, key confirmation, contributiveness, key control and key-replication resilience.
在组密钥交换(GKE)协议中,用户通常使用在执行过程中生成的一些辅助(临时)秘密信息提取组密钥。强破坏是指攻击者除了可能使用的长期密钥之外,还可以泄露这些短暂的秘密。毫无疑问,强腐败对安全的影响是严重的,因此,指定适当的安全需求和设计安全的GKE协议似乎是一项有趣但具有挑战性的任务——这也是本文的目的。我们首先调查当前的强破坏设置,并得出一些改进,例如开放攻击,允许在没有长期密钥的情况下泄露用户的短暂秘密。这允许考虑对诚实但“开放”的用户进行更强的攻击。此外,我们为存在如此强大的对手的GKE协议定义了强大的安全目标,并提出了一个名为TDH1的3轮GKE协议,该协议在标准加密假设下仍然不受攻击。我们的安全定义允许攻击者注册用户并指定他们的长期密钥,因此,特别是捕获恶意内部人员的攻击,以实现适当的安全目标,如相互身份验证、密钥确认、贡献性、密钥控制和密钥复制弹性。
{"title":"Securing group key exchange against strong corruptions and key registration attacks","authors":"E. Bresson, M. Manulis","doi":"10.1504/IJACT.2008.021083","DOIUrl":"https://doi.org/10.1504/IJACT.2008.021083","url":null,"abstract":"In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task – the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stronger attacks against honest, but 'opened' users. Further, we define strong security goals for GKE protocols in the presence of such powerful adversaries and propose a 3-round GKE protocol, named TDH1, which remains immune to their attacks under standard cryptographic assumptions. Our security definitions allow adversaries to register users and specify their long-lived keys, thus, in particular capture attacks of malicious insiders for the appropriate security goals such as Mutual Authentication, key confirmation, contributiveness, key control and key-replication resilience.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Int. J. Appl. Cryptogr.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1