Electronic Contract Signing without Using Trusted Third Party
|
|
|
- Emerald Gray
- 10 years ago
- Views:
Transcription
1 Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore Management University Abstract. Electronic contract signing allows two potentially dis-trustful parties to digitally sign an electronic document simultaneously across a network. Existing solutions for electronic contract signing either require the involvement of a trusted third party (TTP), or are complex and expensive in communication and computation. In this paper we propose an electronic contract signing protocol between two parties with the following advantages over existing solutions: 1) it is practical and scalable due to its simplicity and high efficiency; 2) it does not require any trusted third party as the mediator; and 3) it guarantees fairness between the two signing parties. We achieve these properties by employing a trustworthy timestamping service in our protocol, where the timestamping service can be either centralized or decentralized. We also provide a detailed analysis on security and performance of our scheme. 1 Introduction Contract signing is a frequent activity in business as well as in our daily lives, e.g. purchasing real estates and insurance, employment, and financial trading. Almost all important commercial and financial activities require legally signed contracts to guarantee that the involved parties commit to mutually agreed terms and conditions and fulfill their obligations. Most important contracts today, however, are signed physically, e.g., using pen and paper. As a result, signing a contract could be very time consuming and costly, and it may take several days or weeks to complete. As the information technology and digital signature laws are becoming more and more pervasive, it is high time to consider digitally signing electronic contracts across the Internet. Fairness is a critical requirement for electronic contract signing, which ensures that the two involved parties either obtain each other s signature simultaneously or nothing useful. The fairness property implies that a dishonest party who tries to cheat cannot get any advantage over the other party. Achieving fairness is straightforward for physically signing contracts; however, due to lack of simultaneity in computer networks, achieving true fairness in electronic contract signing over Internet has been a challenging problem. Many electronic contract signing or fair exchange protocols have been proposed in the literature, but none of them have gained widespread adoption. Among these protocols, some require
2 an online or offline trusted third party (TTP) to mediate the exchange, while others are TTP-free but impractical due to high computation and communication overhead. In this paper, we propose a practical electronic contract signing protocol built on a trustworthy timestamping service, without using any TTP. Our protocol enjoys the following advantages over existing ones. First, it is very practical and scalable due to its simplicity and high efficiency in computation and communication. Unlike TTP-free protocols which need multiple rounds of communication between the two signing parties [1], our protocol only requires three messages to be exchanged. The protocol at the same time does not require complex computations except a few digital signatures, which makes it very efficient in computation. Secondly, our protocol does not require any TTP, thus removing the single point of failure and the bottleneck for scalability. Third, the protocol guarantees fairness between the two signing parties. The two parties negotiate and agree on a deadline before which the contract must be signed by both of them. Failing to fulfill this requirement leads to invalidity of the contract, and this protects the interest of the first party against malicious behaviors of the second party. 2 Related Work Electronic commerce has greatly motivated research in electronic contract signing. According to the extent to which a TTP is involved in the contract signing process, existing protocols can be divided into three groups: 1) TTP-free protocols; 2) protocols with an online TTP; and 3) protocols with an offline TTP. TTP-free Protocols. TTP-free protocols have the advantage of no need for a specialized TTP, and its design goal is to fulfill the computational fairness [1]. The idea is for two signing parties to exchange their signatures on a contract bitby-bit. Whenever any of the two parties terminates prematurely, both of them can still complete the exchange offline by exhaustively searching the remaining bits of the signatures. Although this approach enjoys the great advantage of being TTP-free, it is impractical for most real-world applications. The main reason is due to the high computation and communication cost of such protocols. Online-TTP Protocols. Since a TTP facilitates the execution of the signing process, contract-signing protocols with an online TTP can be much simpler and efficient [2]. Under the online-ttp setting, a TTP acts as a mediator between the two signing parties. The main issue with the online-ttp protocols is that the TTP is likely to become a performance and security bottleneck of the system, especially when there are a huge number of participants in the system. Offline-TTP Protocols. Contract-signing protocols with an offline TTP [3,4,5] are more appealing and practical because the TTP is not involved during the execution of an exchange unless some problems occur. Fair exchange protocols for digital signatures employed two different cryptographic techniques: verifiable encrypted signatures [5] and verifiable escrows [3].
3 3 The Proposed Protocol 3.1 System Model Our proposed contract signing protocol involves three types of generic entities or roles: a PKI, a timestamping server and signing parties. The design goal is to enable any two parties to sign an electronic contract in a fair manner. We assume that each party has a public key/private key pair in a signature scheme. The PKI is responsible for public key certificate management for all parties. To ensure security and resilience of the PKI, a resilient PKI system in [6] can be used. The trustworthy timestamping service is crucial to ensure fairness in our contract signing protocol. It is used to produce irrefutable timestamped proofs that digital signatures on a common contract document are submitted by the two parties before a mutually agreed deadline. These proofs are maintained by the timestamping server, and no party can forge or tamper the proofs without being detected. 3.2 Threat Model We assume that both the PKI and the timestamping service are trustworthy. Specifically, the timestamping server does not need to be trusted as a TTP. The adversary can be a peer with whom a party wants to sign a contract, other uninvolved parties or simply an outsider. The adversary is assumed to have only limited computation capability, and he cannot break the digital signature algorithm used in the proposed protocol. The ultimate goal of the adversary is to trick an honest party into signing a contract he would otherwise not want to sign. The adversary can launch both passive and active attacks against the contract signing protocol, including message eavesdropping, modification, forgery, replaying and so on. 3.3 Protocol Description After two parties, referred to here as A and B, have finished negotiating terms and conditions, they agree on a final contract document C. Let Cert X denote the public key certificate of party X and Sign X (M) the signature generated by signing message M with the private key of party X, where X can be either A or B. Let Ver X (M) denote verification of a signature on M using X s public key, which outputs true if the verification is successful and false otherwise. As showed in Fig. 1, the proposed protocol is composed of three phases: signing by the first party, verification and signing by the other party, and timestamping the signed contract. They are described in detail as follows.
4 Signing by the first party To sign a contract, A and B negotiate with each other and decide on a future time T d as the deadline before which the two parties must sign on C; otherwise the contract becomes void. How to set this parameter depends on specific applications. It may be in seconds, minutes, hours, or even days. Party A, who signs the contract first, needs to make sure that this parameter is not too long to render herself in a disadvantageous situation. For example, if A wants to trade forex with the other party, then T d should be as short as a few seconds since forex prices fluctuate at seconds. Party A then creates a message containing a hash of the contract C, the deadline T d, A s identity and B s identity, and signs this message with her private key. That is, A generates the signature Sig A = Sign A (H(C) T d A B), where denotes concatenation, and H() is a secure one-way hash function. Then A sends the following to B: H(C), T d, Sig A, Cert A (1) Verification and signing by the second party Upon receiving the message from A, the second party, B, first checks that the Cert A is valid, the deadline T d has not expired and there is sufficient time left to finish the contract; otherwise he aborts the protocol. To continue the contract signing protocol, B checks that H(C) is the hash computed over the contract document C he negotiated with A, and verifies that Sig A is A s valid signature on (H(C) T d A B). If the verifications fail, B aborts; otherwise, B signs the message (H(C), T d, A, B, Sig A ) to obtain a signature Sig B = Sign B (H(C) T d A B Sig A ), and sends the following message to the timestamping server: H(C), T d, A, B, Sig A, Sig B, Cert A, Cert B. (2) We refer to the above message (H(C), T d, A, B, Sig A, Sig B, Cert A, Cert B ) as the signed contract and denote it as CT in the following. Timestamping the signed contract After receiving CT from B, the timestamping server TS first checks that Cert A and Cert B are valid, that T d has not expired and that the two signatures Sig A and Sig B were generated on the same hash value H(C) by parties A and B, respectively. Only if all verifications are successful will TS proceed to generate a trustworthy timestamp on the signed contract CT = (H(C), T d, Sig A, Sig B, Cert A, Cert B ). The timestamping server then sends the following message to both parties A and B as a proof that the contract has been signed successfully: CT, ts(ct), (3) where ts(ct) denotes the timestamp on CT. What constitutes the timestamp will be described in the following subsection.
5 Timestamping Server (3) CT, ts(ct) (3) CT, ts(ct) (2) H(C), Td, SigA, SigB CertA, CertB Signer A (1) H(C), Td, SigA,CertA Signer B PKI 3.4 Timestamping Service Fig. 1. The Contract Signing Protocol. The trustworthy timestamping service referred to above in our protocol description can be implemented with a centralized server as in [7] or a decentralized system based on the blockchain mechanism in Bitcoin [8]. Both implementations adopt a similar approach to trustworthy timestamping as described below. This timestamping service is built on the Merkle tree structure, a binary tree as showed in 2(a). A node at (i, j) on the Merkle tree has two children: (i + 1, 2j 1) and (i + 1, 2j). The root node is labeled as (0, 1), meaning it is the first node at layer 0. The value H(i, j) for a leaf node (i, j) is simply the hash of the corresponding contract content, i.e. H(CT(i)). The value of an interior node is calculated from its two children by the formula H(i, j) = H(H(i+1, 2j 1) H(i+1, 2j)). The hash function can be any cryptographically secure hash algorithm, e.g. SHA256. The value calculated at the root is called the Merkle root. The timestamping service divides time into fixed time intervals and at the end of each interval compresses submitted contracts into a Merkle root. This Merkle root, along with the current time, is taken as an input into a hash chain which is computed and maintained by a server in the centralized system or by a group of nodes in the decentralized system. The output of the hash chain and some auxiliary data corresponding to the specific contract are returned to the parties as the trustworthy timestamp on their contract. The process of timestamping a Merkle root and hence all the contracts embedded in the root proceeds as illustrated in Fig. 2(b). In each fixed time interval, a Merkle root is calculated as above for all contracts submitted during this interval. The Merkle root, the current time and the previous hash value of the hash chain are fed into the hash function to calculate a new value, and the hash chain is extended by 1. Suppose the current time is T i, the previous hash value of the hash chain is h i 1, and the current Merkle root is root i, then the new hash value is computed as h i = H(h i 1 T i root i ). The timestamp for a contract, say CT(3), at time interval T i, is given by ts(ct(3)) = (H(0, 1), H(1, 2), H(2, 1), H(3, 4), T i, h i 1, h i ).
6 H(3,1) Timestamp Ti Timestamp Ti+1 H(0,1) Merkle root Hash Computation hi Hash Computation hi+1 Merkle Root Merkle Root H(1,1) H(1,2) Merkle Hash Computation from Signed Contracts Merkle Hash Computation from Signed Contracts H(2,1) H(2,2) H(2,3) H(2,4) H(3,2) H(3,3) H(3,4) H(3,5) H(3,6) H(3,7) H(3,8) CT(1) CT(2) CT(3) CT(4) CT'(1) CT'(2) CT'(3) CT'(4) CT(5) CT(6) CT(n) CT'(5) CT'(6) CT'(m) CT(1) CT(2) CT(3) CT(4) CT(5) CT(6) CT(7) CT(8) (a) The Merkle Hash Tree Fig. 2. The Timestamping Service (b) Timestamping the Contracts For a centralized solution, the timestamping server needs to publish all tuples (h i, T i, root i ). The latest hash values obtained in this way by a centralized server need to be published on an unalterable public media in a fixed interval (e.g., New York Times every week [7]). Therefore, even the centralized server cannot change the hash chain or the Merkle tree after publishing the last value on the hash chain. Thus the centralized server needs not be a TTP. A decentralized timestamping service can be realized based on the notion of blockchain in Bitcoin [8], where hash values represent proof-of-work done collectively by a group of entities (e.g., users of the timestamping service). At each time interval T i, the group of entities finds a random value as the input to the hash chain computation formula such that the output of the hash computation is less than a pre-determined public threshold. That is, the hash chain computation formula becomes h i = H(h i 1 T i root i r i ), and one has to find an r i such that h i is less than the public threshold, which is called proof-of-work. Finally, all hash values and the proof-of-work r i s are published on the blockchain so that everyone can check them. Due to the one-wayness of the hash function H(), finding a valid r i such that h i is less than a threshold could be very difficult. The amount of computation to find r i can be adjusted by varying the value of the threshold. Since finding a valid r i is so difficult and the hash chain is continuously increasing, it is computationally infeasible to change a timestamped contract which is embedded in the hash chain, especially when the chain becomes longer [8]. Hence this decentralized system achieves trustworthy timestamping without relying on any centralized entity or trusted third party. 3.5 Timestamp and contract verifications When both parties receive a timestamp on their signed contract from the timestamping server, they proceed to verify the timestamp for correctness. Without loss of generality, assume that the centralized timestamping service in [7] is used. We describe the verification process by taking the aforementioned timestamp ts(ct(3)) = (H(0, 1), H(1, 2), H(2, 1), H(3, 4), T i, h i 1, h i ) as an example. To
7 verify this timestamp, both parties first check that the Merkle root is indeed computed from CT(3) by evaluating the hash tree from bottom to the root. That is, each party computes and checks if the following equations hold: H(3, 3) = H(CT(3)); H(2, 2) = H(H(3, 3) H(3, 4)); H(1, 1) = H(H(2, 1) H(2, 2)); root = H(H(1, 1) H(1, 2)); root? = H(0, 1). Then each party verifies if the hash chain value is correctly calculated by testing? the following equation: h i = H(hi 1 T i root). Next, both parties retrieve subsequent published tuples (h i+1, T i+1, root i+1 ), (h i+2, T i+2, root i+2 )..., (h m, T m, root m ) from the timestamping server, where h m is the latest hash value published on the unalterable public media (i.e. newspaper). Then they verify all of the hash values are correctly computed as follows:? h i+k = H(hi+k 1 T i+k root i+k ), where k = 1, 2,..., m i. If all verifications are successful, then they can be ensured that the timestamped proof is trustworthy. Whenever a dispute occurs about a contract, either party can present the o- riginal contract document C, the signed contract CT = (H(C), T d, A, B, Sig A, Sig B, Cert A, Cert B ) and its timestamp to a judge for dispute resolution. To verify that parties A and B had indeed committed to the contract before time T i, the judge first tests if the following equations are true: H(C )? = H(C); Sig A Sig B? = Sign A (H(C) T d A B);? = Sign B (H(C) T d A B Sig A). Then the judge verifies the timestamp following the same procedure as discussed earlier in this subsection. The contract is declared valid only if the signed contract and the timestamp both pass verification. 4 Discussion and Analysis The First Party is Dishonest. In any contract signing scenario, the party who signs first is always in an unfavorable situation since he is the first to make a commitment. The second party always has two options to choose depending on which one is in his favor. The best choice for the first party A is to set T d as early as possible so that party B is left with little time to exploit the situation. Nevertheless, A may try to cheat B by modifying content of the contract, delaying to send her signature, or changing the deadline T d. But none of these methods can bring A any advantage over B. The Second Party is Dishonest. As the last one to commit to the contract, the second party B can always choose whether or not to commit the contract, and hence possesses obvious advantages over the first committer A. Specifically,
8 a dishonest B can launch attacks by modifying the deadline T d, delaying contract signing, or modifying the contract content. But these attacks will be easily detected by the timestamping server. Contract Privacy. Privacy of content of a signed contract is well protected from disclosure by hashing the contract instead of submitting the original contract document. As a result, even the timestamping server does not know the content, but only a hash over the contract. Only when a dispute occurs between the signing parties will the contract document need to be disclosed for dispute resolution. Performance. The proposed scheme is very concise with only three message transmissions. The computation cost for the first party is only one signature generation, while the second party needs to verify the first party s signature and then generate his own signature. For each contract timestamping request, the timestamping server needs to verify two signatures, which is insignificant for a resourceful server. The computation cost of the timestamping server is on the order of O(n) where n is the number of requests for timestamping services, so the proposed protocol scales to the number of requests. 5 Conclusion In this paper, we have proposed a practical fair electronic contract signing protocol which does not require any online or offline TTP. The proposed protocol relies on a trustworthy timestamping service which can be implemented without any trusted third party. The protocol contains only three messages and is very efficient in computation and communication. We have also provided a detailed analysis on its security and performance. Due to its simplicity and efficiency, the proposed protocol is highly practical for many e-commerce applications. References 1. Goldreich, O.: A Simple Protocol for Signing Contracts. In: Proc. CRYPTO 83, pp Plenum Press (1983) 2. Ben-Or, M., Goldreich O., Micali, S., Rivest, R.L.: A Fair Protocol for Signing Contracts. IEEE Trans. Inf. Theory, vol. 36, no. 1, pp (1990) 3. Asokan, N., Shoup, V., Waidner, M.: Optimistic Fair Exchange of Digital Signatures. In: Proc. EUROCRYPT 98, LNCS, vol. 1403, pp (1998) 4. Ateniese, G.: Efficient Verifiable Encryption (and Fair Exchange) of Digital Signature. In: Proc. ACM Conf. CCS 99, pp ACM Press (1999) 5. Bao, F., Deng, R.H., Mao, W.: Efficient and Practical Fair Exchange Protocols with Off-line TTP. In: Proc. IEEE Symp. Security and Privacy, pp (1998) 6. Kim, T., Huang, L.-S., Perrig, A., Jackson, C., Gligor, V.: Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure. In: Proc. of the International World Wide Web Conference (WWW), (2013) 7. Haber, S., Stornetta, W.S.: How to Time-stamp a Digital Document. Journal of Cryptology, vol. 3, no. 2, pp (1991) 8. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. (2008)
A Survey on Optimistic Fair Digital Signature Exchange Protocols
A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Official Arbitration with Secure Cloud Storage Application
Official Arbitration with Secure Cloud Storage Application Alptekin Küpçü Koç University, İstanbul, Turkey [email protected] February 11, 2013 Abstract Static and dynamic proof of storage schemes have been
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
How to Protect Peer-to-Peer Online Games from Cheats
How to Protect Peer-to-Peer Online Games from Cheats Haruhiro Yoshimoto Rie Shigetomi Hideki Imai University of Tokyo Imai Laboratory, Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba,
SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks
IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman)
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [email protected] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
An Anonymous Fair Exchange E-commerce Protocol
An Anonymous Fair Exchange E-commerce Protocol Indrakshi Ray Indrajit Ray Department of Computer and Information Science University of Michigan-Dearborn 490 Evergreen Road, Dearborn, MI 488 Email: iray,
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
Filecoin: A Cryptocurrency Operated File Storage Network
Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
ARPKI: Attack Resilient Public-Key Infrastructure
ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
Cloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Basrah, 61004, Iraq, Basrah, 61004, Iraq, [email protected]
Security and Integrity of Data in Cloud Computing Based on Feature Extraction of Handwriting Signature Ali A. Yassin 1, Hikmat Z. Neima 2, and Haider Sh. Hashim 1 1 Computer Science Dept., Education College
Contract Signing. Contract-Signing Protocols. Another example: stock trading. Example. Network is Asynchronous. Fundamental limitation
ECS Week 2005 Contract-Signing Protocols John itchell Stanford Contract Signing wo parties want to sign a contract ulti-party signing is more complicated he contract is known to both parties he protocols
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
I. Introduction. A. Related Work
PUBLIC VERIFIABILITY AND DATA DYNAMICS IN CLOUD SERVER P.Saranya, Roever Engineering College; S.Vishnupriya, Roever Engineering College; E.Elangovan, PRIST University Abstract- Cloud computing stores the
A Novel Approach for Signing Multiple Messages: Hash- Based Signature
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
The Reduced Address Space (RAS) for Application Memory Authentication
The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want
Orwell. From Bitcoin to secure Domain Name System
Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, 60-965 Poznań, Poland {Michal.Jabczynski, Michal.Szychowiak}@put.poznan.pl
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Reducing Certificate Revocation Cost using NPKI
Reducing Certificate Revocation Cost using NPKI Albert Levi and Çetin Kaya Koç Oregon State University, Electrical and Computer Engineering Dept., Information Security Lab, Corvallis, Oregon, USA [email protected]
An Efficient Certified Email Protocol
An Efficient Certified Email Protocol Jun Shao 1,MinFeng 2,,BinZhu 2,andZhenfuCao 1 1 Department of Computer Science and Engineering Shanghai Jiao Tong University 200030, Shanghai, China P.R.C 2 Microsoft
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation
Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation Martín Augusto G. Vigil Ricardo Felipe Custódio Joni da Silva Fraga Juliano Romani Fernando Carlos Pereira Federal
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
How To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
Application of Electronic Currency on the Online Payment System like PayPal
Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Remote Data Integrity Checking in Cloud Computing
ISSN 2321 8169 Remote Data Integrity Checking in Cloud Computing Khaba M.V (Assistant Professor/CSE) RVS School of Engineering,dindigul [email protected] M.Santhanalakshmi(Assistant Professor/CSE) RVS
Bitmessage: A Peer to Peer Message Authentication and Delivery System
Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren [email protected] www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Computer Science 308-547A Cryptography and Data Security. Claude Crépeau
Computer Science 308-547A Cryptography and Data Security Claude Crépeau These notes are, largely, transcriptions by Anton Stiglic of class notes from the former course Cryptography and Data Security (308-647A)
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
