特刊:网络安全与密码学- SCN 2020

Clemente Galdi, V. Kolesnikov
{"title":"特刊:网络安全与密码学- SCN 2020","authors":"Clemente Galdi, V. Kolesnikov","doi":"10.3233/jcs-219000","DOIUrl":null,"url":null,"abstract":"This special issue includes several papers that have been selected from the program of the 12th Conference on Security and Cryptography for Networks. The conference, originally planned in Amalfi (SA), Italy, was held online on Sept. 14–16, 2020, due to Covid-19. The papers appearing in the present issue have been extended from their original conference versions, and have gone through a second rigorous reviewing process. We briefly review the papers included in this issue: Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE by Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl and Juan Ramón Troncoso-Pastoriza constructs Oblivious Linear Function Evaluation (OLE) protocols from the Ring-LWE problem. OLE has recently been shown to be very useful in practical multiparty computation, and this work proposes lattice-based OLE protocols and analyzes their standalone efficiency. In Double-Authentication-Preventing Signatures in the Standard Model, Dario Catalano, Georg Fuchsbauer and Azam Soleimanian present efficient DAPS schemes that are secure in the standard model and support large address spaces. DAPS is a special type of signature meant to punish the signer if it signs two messages with the same “address.” For example, this may be desired if the signer issues two different certificates for the same domain. The paper Private Identity Agreement for Private Set Functionalities by Benjamin Terner, Benjamin Kreuter and Sarvar Patel explores an interesting twist on private set intersection. If we want to compute a function of the intersection of our data, we need to first “align” our data so that we hold identical identifiers for any records that match. The situation is even more complicated when identifiers are “fuzzy” as in real-world data. In those cases, one party may hold several records corresponding to the same person, but be unaware of this fact. Only when combined with another data set will this fact be evident (if the other data set contains a record that connects with both). This paper proposes a method for two parties to privately assign identifiers to records in this kind of scenario. The main challenge here is the transitive nature of whether two records match. In Fast Threshold ECDSA with Honest Majority, Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter and Michael Bæksvang Østergaard propose a new faster threshold variant of the ECDSA signature scheme.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Special issue: Security and Cryptography for Networks - SCN 2020\",\"authors\":\"Clemente Galdi, V. Kolesnikov\",\"doi\":\"10.3233/jcs-219000\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This special issue includes several papers that have been selected from the program of the 12th Conference on Security and Cryptography for Networks. The conference, originally planned in Amalfi (SA), Italy, was held online on Sept. 14–16, 2020, due to Covid-19. The papers appearing in the present issue have been extended from their original conference versions, and have gone through a second rigorous reviewing process. We briefly review the papers included in this issue: Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE by Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl and Juan Ramón Troncoso-Pastoriza constructs Oblivious Linear Function Evaluation (OLE) protocols from the Ring-LWE problem. OLE has recently been shown to be very useful in practical multiparty computation, and this work proposes lattice-based OLE protocols and analyzes their standalone efficiency. In Double-Authentication-Preventing Signatures in the Standard Model, Dario Catalano, Georg Fuchsbauer and Azam Soleimanian present efficient DAPS schemes that are secure in the standard model and support large address spaces. DAPS is a special type of signature meant to punish the signer if it signs two messages with the same “address.” For example, this may be desired if the signer issues two different certificates for the same domain. The paper Private Identity Agreement for Private Set Functionalities by Benjamin Terner, Benjamin Kreuter and Sarvar Patel explores an interesting twist on private set intersection. If we want to compute a function of the intersection of our data, we need to first “align” our data so that we hold identical identifiers for any records that match. The situation is even more complicated when identifiers are “fuzzy” as in real-world data. In those cases, one party may hold several records corresponding to the same person, but be unaware of this fact. Only when combined with another data set will this fact be evident (if the other data set contains a record that connects with both). This paper proposes a method for two parties to privately assign identifiers to records in this kind of scenario. The main challenge here is the transitive nature of whether two records match. In Fast Threshold ECDSA with Honest Majority, Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter and Michael Bæksvang Østergaard propose a new faster threshold variant of the ECDSA signature scheme.\",\"PeriodicalId\":142580,\"journal\":{\"name\":\"J. Comput. Secur.\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Comput. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/jcs-219000\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/jcs-219000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本特刊收录了从第12届网络安全与密码学会议中精选的几篇论文。该会议原定于2020年9月14日至16日在意大利阿马尔菲(SA)举行,原因是新冠肺炎。本期发表的论文已从原来的会议版本扩充,并经过了第二次严格的审查程序。我们简要回顾了这期中包含的论文:Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl和Juan在Ring-LWE问题上构造的遗忘线性函数评估(Oblivious Linear Function Evaluation, OLE)协议。OLE最近在实际的多方计算中被证明是非常有用的,本工作提出了基于格的OLE协议并分析了它们的独立效率。Dario Catalano、Georg Fuchsbauer和Azam Soleimanian在《标准模型中的防止双重认证签名》中提出了在标准模型中安全且支持大地址空间的高效DAPS方案。DAPS是一种特殊类型的签名,如果签名者用相同的“地址”签署了两条消息,就会受到惩罚。例如,如果签名者为同一域颁发两个不同的证书,这可能是需要的。Benjamin Terner, Benjamin Kreuter和Sarvar Patel的论文Private Identity Agreement for Private Set functions探讨了关于Private Set intersection的一个有趣的转折。如果我们想要计算数据交集的函数,我们需要首先“对齐”我们的数据,以便我们为任何匹配的记录保留相同的标识符。当标识符像真实世界的数据一样“模糊”时,情况就更加复杂了。在这些情况下,一方可能持有与同一人对应的几份记录,但不知道这一事实。只有当与另一个数据集结合时,这个事实才会明显(如果另一个数据集包含与两者连接的记录)。在这种情况下,本文提出了一种双方私下为记录分配标识符的方法。这里的主要挑战是两个记录是否匹配的传递性。在Fast Threshold ECDSA with Honest Majority中,Ivan damg、Thomas P. Jakobsen、Jesper Buus Nielsen、Jakob Illeborg Pagter和Michael Bæksvang Østergaard提出了一种新的更快的ECDSA签名方案的阈值变体。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Special issue: Security and Cryptography for Networks - SCN 2020
This special issue includes several papers that have been selected from the program of the 12th Conference on Security and Cryptography for Networks. The conference, originally planned in Amalfi (SA), Italy, was held online on Sept. 14–16, 2020, due to Covid-19. The papers appearing in the present issue have been extended from their original conference versions, and have gone through a second rigorous reviewing process. We briefly review the papers included in this issue: Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE by Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl and Juan Ramón Troncoso-Pastoriza constructs Oblivious Linear Function Evaluation (OLE) protocols from the Ring-LWE problem. OLE has recently been shown to be very useful in practical multiparty computation, and this work proposes lattice-based OLE protocols and analyzes their standalone efficiency. In Double-Authentication-Preventing Signatures in the Standard Model, Dario Catalano, Georg Fuchsbauer and Azam Soleimanian present efficient DAPS schemes that are secure in the standard model and support large address spaces. DAPS is a special type of signature meant to punish the signer if it signs two messages with the same “address.” For example, this may be desired if the signer issues two different certificates for the same domain. The paper Private Identity Agreement for Private Set Functionalities by Benjamin Terner, Benjamin Kreuter and Sarvar Patel explores an interesting twist on private set intersection. If we want to compute a function of the intersection of our data, we need to first “align” our data so that we hold identical identifiers for any records that match. The situation is even more complicated when identifiers are “fuzzy” as in real-world data. In those cases, one party may hold several records corresponding to the same person, but be unaware of this fact. Only when combined with another data set will this fact be evident (if the other data set contains a record that connects with both). This paper proposes a method for two parties to privately assign identifiers to records in this kind of scenario. The main challenge here is the transitive nature of whether two records match. In Fast Threshold ECDSA with Honest Majority, Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter and Michael Bæksvang Østergaard propose a new faster threshold variant of the ECDSA signature scheme.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data privacy in the Internet of Things based on anonymization: A review A mutation-based approach for the formal and automated analysis of security ceremonies StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception IsaNet: A framework for verifying secure data plane protocols A review on cloud security issues and solutions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1