Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks
|
|
|
- Bryan Armstrong
- 10 years ago
- Views:
Transcription
1 Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks (Extended Abstract) Zinaida Benenson 1, Felix C. Freiling 2, Birgit Pfitzmann 3, Christian Rohner 1, and Michael Waidner 3 1 Uppsala University, Department of Information Technology {zina,chrohner}@it.uu.se 2 University of Mannheim, Informatik 1 [email protected] 3 IBM Research, Zurich Research Lab {bpf,wmi}@zurich.ibm.com Abstract. We introduce verifiable agreement as a fundamental service for securing mobile peer-to-peer ad hoc networks, and investigate its solvability. Verifiability of a protocol result means that the participants can prove that the protocol reached a particular result to any third party (the verifier) which was not present in the network at the time of the protocol execution. 1 Introduction 1.1 Motivation The envisioned applications of ad hoc networks often follow the scenario where a group of nodes meets for a short time, conducts some transaction, such as a collaborative document editing session, a decision to take some coordinated action, or dissemination of information to all group members, and then breaks apart, perhaps forever. We call this type of the network mobile peer-to-peer ad hoc network. In this scenario, there is no centralized logging of the transaction, no transaction witnesses, apart from the participants themselves. Thus, to make the result of the transaction binding, it should be made verifiable. That is, after the transaction is finished, each participant should be able to prove to some third party which was not present in the network at the time of the transaction that this particular transaction (1) happened, (2) was conducted by the certain group of participants, and (3) reached a particular outcome. We call this problem Verifiable Agreement on the transaction result. Requiring that each participant be able to carry out the proof without the help of any other participant seems to be the most safe decision, as there is no guarantee that any other participant would be reachable at the time when the proof is conducted. Verifiable Agreement is a crucial problem for securing mobile peer-to-peer ad hoc networks. Indeed, especially if such networks are set up in emergency situations, with participants from different organizations or different countries, the
2 participants may distrust each other. Unfortunately, as we show below, the nonrepudiation of the decisions made in this situation can only be reached if the majority of participants can be trusted. This puts a strict restriction on the usage of this network type for trust-critical applications. 1.2 Agreement and Contract Signing We denote by Agreement a class of problems where a set of n parties P := {P 1,..., P n } start with initial inputs x 1,..., x n. Some parties might be dishonest and arbitrary deviate from their programs. All honest parties must eventually, or with some high probability, terminate and agree on a common result, y, which is valid. Validity defines a particular agreement problem: In Interactive Consistency [19], the parties must agree on a vector y, where the ith element must be x i for all honest parties P i, otherwise it can be any value. In Consensus [8], if there is a value x such that x i = x for all honest parties P i, then y = x. Other agreement problems include Byzantine Generals Problem (also called Byzantine Agreement) [16], Weak Byzantine Agreement [15], Atomic Commitment [21], Strong Consensus [9], Validated Byzantine Agreement [14]. In contrast to Secure Multi-Party Computation [11], the inputs of the parties do not need to be secret or independent. Contract signing [6] can be considered as an agreement problem where the parties must agree either on a contract text or on a special value failed, which means that no contract was signed. The signed contract can be an outcome of the contract signing protocol only if all honest parties want to sign the same contract text. The signed contract must be verifiable. Informally, verifiability can be described as follows: Each honest party can convince a verifier V, which knows nothing about a particular protocol run, that this protocol run yielded the result y. If some protocol run yielded the result y, no party can convince V that the protocol yielded some result y y. The result failed is usually left non-verifiable. This reflects the real-world situation where no proof of the fact that a contract was not signed is required. 1.3 Related Work Apart from contract signing, which has been an active research area for several decades, the only approach to make an agreement problem verifiable, as far as we know, is undertaken in [21]. There, a specification for verifiable atomic commitment for electronic payment protocols is presented, but no explicit definition of verifiability is given. A different notion of verifiable agreement was introduced in [14]: each honest protocol participant P i can convince any other honest participant P j of its result, but not necessarily any outsider. Multi-party contract signing protocols are presented, e.g., in [2, 5, 10]. For an overview of recent work, see also [22].
3 1.4 Outline and Contribution After presenting the system model in Section 2, we give a unifying definition of agreement problems which facilitates rigorous proofs, and define verifiable agreement (Section 3). We show that in case of dishonest majorities, verifiable agreement cannot be solved (Section 4.1). This puts a fundamental limit on non-repudiation of transactions in mobile peer-to-peer ad hoc networks. In contrast, some agreement problems, such as Interactive Consistency, can be solved for any number of dishonest parties. We present a verifiable agreement protocol for honest majorities, in Section 4.2. Finally, in Section 5, we discuss our system assumptions and the applications of verifiable agreement. 2 System Model and Preliminaries 2.1 System Model Let P = {P 1,..., P n } denote the set of participats of an agreement protocol, and V denote a verifier. Let X 2 and Y 2 be two finite sets representing the inputs and the outputs of individual participants P i. We assume (w.l.o.g.) that Y contains a distinguished element failed. For a subset of parties H P we denote by X H the set of all H -dimensional vectors with elements from X. The parties P i can digitally sign messages, and all parties can verify their signatures. The signature on message m associated with party P i is denoted by sign i (m). The adversary can a priori choose to corrupt a certain subset of parties. It has full control over the behavior and knowledge of dishonest parties (Byzantine failures). We assume that the adversary cannot forge signatures. We consider both synchronous and asynchronous networks with reliable communication channels. 2.2 Preliminary Definitions Honesty structure formalizes for which sets of honest parties the problem should be solved 4. Definition 1. An honesty structure H for a set of parties P is a set of subsets of P such that if H H and H H P then H H. The definition reflects the intuition that any protocol that works given a certain set H of honest parties should also work in case there are more honest parties. An honesty structure H satisfies condition Q 2 if H 1 H 2 for all H 1, H 2 H, and it satisfies condition Q 3 if H 1 H 2 H 3 for all H 1, H 2, H 3 H [12]. 4 The corresponding notion from the area of secret sharing is access structure. An adversary structure [12], which consists of all sets of dishonest parties a protocol can withstand, is the complement of it.
4 A threshold honesty structure H t for a threshold t < n is a set of subsets of P such that H t = {H P : H > n t}. A threshold honesty structure satisfies Q 2 or Q 3 if and only if t n 2 or t n 3, respectively. Thus, the condition Q 2 generalizes the notion of honest majority. We now define validity functions, which we use in the following to describe validity conditions of agreement problems. Definition 2. Let H be an honesty structure. A validity function for the sets X, Y, and H is a function F that maps pairs (H, x) H X H to subsets of Y, the allowed outputs. It must satisfy the Non-triviality condition: y failed x X P : y F (P, x) and x X P : F (P, x) {failed}. Non-triviality excludes all consensus problems which can be solved by the trivial protocol which always outputs a constant result y, or always fails. We do not exclude problems that allow the output failed for all initial inputs, because the result failed is sometimes unavoidable. In the following, we give examples of validity functions for some well-known problems. Consensus with Y = X is described by: { {x} if xi = x P F C (H, x) := i H X otherwise. Interactive Consistency with Y = X P is described by: F IC (H, x) := {y X P y i = x i P i H, y i X otherwise.}, where y i denotes the ith element of the vector y X P. 3 Definition of Verifiable Agreement We first define agreement problems. Definition 3. An agreement problem for a validity function F is to devise a protocol consensus[] for parties P 1,..., P n. In order to start the protocol, a party P i receives the input x i. Upon termination, the protocol produces an output y i Y for each P i. The following requirements must be satisfied for all sets H H of actually honest parties and input vectors x X H : Agreement: There is a y Y such that y i = y for all P i H. Validity: y i F (H, x) for all P i H. Correct Execution: If all parties are honest, then for all input vectors x X P with F (P, x) {failed}, the parties will never agree on y = failed. Termination: Eventually each P i H terminates and produces an output y i Y. Correct Execution excludes protocols that always output failed. We now formalize the verifiability of an agreement.
5 Definition 4. A verifiable agreement problem for a validity function F is to devise, in addition to the protocol consensus[], the protocol verify[] which involves only one party P i and a verifier V which does not have any knowledge about the execution of consensus[] or about possible previous runs of verify[]. Party P i starts verify[] with thse input (tid, y) where tid is the transaction identifier of an execution of consensus[] and y is the result obtained from this execution. The verifier decides accepted or verify failed for (tid, y). The following requirements must be satisfied in addition to those from Definition 3 for an honest V and all sets H H of actually honest parties: Verifiability of Correct Result: If P i H obtained the output y for some tid for y failed from consensus[], then V will obtain the result accepted for (tid, y). Non-verifiability of failed: The verifier V never accepts failed for any tid. No Surprises: If some P i H obtained y for some tid from consensus[], then V never decides accepted for any party P j, tid, and any y y. Termination of verify[]: Each V and each P i H eventually terminate. We now show how to define the contract signing problem within our framework. Definition 5. Contract signing is a verifiable consensus problem described by the following validity function: X := C {reject}, where C is a finite set of contract texts that can be signed, Y := C {failed}, and H is the power set of P. Then: { {contr, failed} if contr C such that xi = contr P F CS (H, x) := i H {failed} otherwise. In the full version of this paper, we show that the above definition and the usual definition from, e.g., [2] are equivalent. 4 Solvability of Verifiable Agreement 4.1 Impossibility of Verifiable Agreement for Dishonest Majorities We show that if Q 2 (which generalizes the notion of honest majority) is not satisfied, then the Verifiable Agreement problem cannot be solved even in synchronous networks. In contrast, some agreement problems, e.g., Interactive Consistency, can be solved deterministically in this setting for any honesty structure [19]. As the synchronous network is the most strong network model, this result implies nonsolvability for all other network classes. Theorem 1. No synchronous deterministic protocol can solve Verifiable Agreement if condition Q 2 is not satisfied. The error probability of any probabilistic synchronous verifiable agreement protocol in case Q 2 is not satisfied is unacceptable large, i.e., at least inversely linear in the number of protocol rounds. Due to space limit, we omit the proofs from this extended abstract.
6 4.2 Verifiable Agreement for Honest Majorities We show how to extend any agreement protocol for honesty structures satisfying the condition Q 2 to a verifiable agreement protocol. Protocol 1. Let π be an agreement protocol (Definition 3) for an honesty structure H, input and output sets X and Y and a validity function F. consensus[]: 1. The parties first run the protocol π on their inputs x i for the identifier tid. As soon as a party P i obtains output y i failed, it sends m i := sign i (tid, y i ) to all participants. 2. We call any set M = {sign j1 (tid, y),..., sign jk (tid, y)} where {P j1,..., P jk } H a proof set for (tid, y). P i waits until it has received a proof set for (tid, y i ). verify[]: The verifier V accepts the result y for some tid if and only if it receives a proof set for (tid, y) where y failed. Theorem 2. Protocol 1 solves Verifiable Agreement under the condition Q 2 in both synchronous and asynchronous networks. Proof. (sketch) We only show the less obvious requirements in this extended abstract. Termination of consensus[] (Definition 3): Let H H be the actual set of honest parties. Then all honest parties P i H start π, terminate with the agreement on some result y and send the signed result (message m i ) to all parties (we assume that P i sends m i to itself as well). Thus, eventually each honest party P i receives a proof set and terminates, as we assume reliable communication. No Surprises (Definition 4): Let H be the actual set of honest parties, and assume that the verifier V receives a proof set for some y Y with H H as the set of all signatories of y. Since H H, there is at least one honest party P h H, and as P h signed y, it must be the correct result. Remark 1. If a protocol solves some agreement problem in asynchronous networks, the corresponding honesty structure must satisfy Q 3 [7]. If Q 3 is satisfied, then Q 2 is also satisfied. Therefore, in asynchronous networks, any agreement problem can be solved with verifiability, if it can be solved at all. 5 Discussion 5.1 System Assumptions Most debatable assumption in our system model is reliable communication. In fact, many cryptographic protocols for peer-to-peer ad hoc networks, most notably, group key agreement protocols [3, 4, 20], also make this assumption. This can be justified by relying on reliable group communication services, such as [17, 18]. Another assumption is the ability of the parties to digitally sign their messages. This requires a public-key infrastructure, such as described, e.g., in [13]. For an overview of authentication mechanisms in ad hoc networks, including issues related to the public key infrastructure, see [1].
7 5.2 Applications Verifiable Agreement applies to situations where the result of a transaction should be used in the future. One class of such situations arises when a distributed database is implemented in the ad hoc network and is replicated across some specified nodes, the servers. In this case, transactions conducted in the absence of the servers, should be communicated to them as soon as possible. Consider, for example, the distributed public-key infrastructure in [23]. Using verifiable agreement of the client nodes on the exclusion of bad nodes form the network, each agreement participant can submit the exclusion decision to the service for the purpose of certificate revocation. Another important scenario arises when the transaction conducted by the node in the peer-to-peer group should be used in another context. Consider a meeting which is set up in ad hoc manner, perhaps in an emergency situation, where several organizations from different organizations or countries do not trust each other. They collaboratively edit an important document which they should present in their organizations after the meeting. This document may be, e.g., the minutes of the meeting. It is important to fix the current document state, such that no single party is able to change the local copy of the document undetected. Usually, this can be done using a transaction logging by a trusted site. In the absence of a trusted site, the participants may sign the commitments to the document using a contract signing protocol. To do this, however, as we showed earlier, more than the half of the participants should be trusted not to cheat. In the full version of this paper, we present a contract signing protocol for honest majorities which can be used in the above situations. 5.3 Conclusion We introduced the notion of Verifiable Agreement, and showed its applicability in mobile peer-to-peer ad hoc networks. Limits on the solvability of Verifiable Agreement show that the non-repudiation of any action without relying on an infrastructure requires placing trust into the majority of the participants. References 1. N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. DaSilva, and J.-J. Quisquater. Authentication protocols for ad hoc networks: taxonomy and research issues. In Q2SWinet 05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pages , New York, NY, USA, ACM Press. 2. N. Asokan, B. Baum-Waidner, M. Schunter, and M. Waidner. Optimistic synchronous multi-party contract signing. Technical Report Research Report RZ 3089, IBM Zurich Research Laboratory, N. Asokan and P. Ginzboorg. Key-agreement in ad-hoc networks. Computer Communications, 23(17): , D. Augot, R. Bhaskar, V. Issarny, and D. Sacchetti. An efficient group key agreement protocol for ad hoc networks. In First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing, 2005.
8 5. B. Baum-Waidner and M. Waidner. Round-optimal and abuse-free multi-party contract signing. In International Colloquium on Automata, Languages and Programming, LNCS 1853, M. Blum. Three applications of the oblivious transfer. Technical report, Department of EECS, University of California, Berkeley, CA, G. Bracha and S. Toueg. Asynchronous consensus and broadcast protocols. J. ACM, 32(4), M. J. Fischer. The consensus problem in unreliable distributed systems (a brief survey). In Proceedings of the 1983 International FCT-Conference on Fundamentals of Computation Theory, pages , London, UK, Springer-Verlag. 9. M. Fitzi and J. A. Garay. Efficient player-optimal protocols for strong and differential consensus. In PODC 03: Proceedings of the twenty-second annual symposium on Principles of distributed computing, pages , New York, NY, USA, ACM Press. 10. J. A. Garay and P. D. MacKenzie. Abuse-free multi-party contract signing. In Proceedings of the 13th International Symposium on Distributed Computing, pages , London, UK, Springer-Verlag. 11. S. Goldwasser. Multi party computations: past and present. In PODC 97: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pages 1 6, New York, NY, USA, ACM Press. 12. M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In PODC 97: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pages 25 34, New York, NY, USA, ACM Press. 13. J.-P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In MobiHoc 01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pages , New York, NY, USA, ACM Press. 14. K. Kursawe. Distributed Trust. PhD thesis, Department of Computer Science, Saarland University, L. Lamport. The weak byzantine generals problem. J. ACM, 30(3): , L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3): , J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny. Group management for mobile ad hoc networks: design, implementation and experiment. In MDM 05: Proceedings of the 6th international conference on Mobile data management, pages , New York, NY, USA, ACM Press. 18. J. Luo, P. T. Eugster, and J.-P. Hubaux. Pilot: Probabilistic lightweight group communication system for ad hoc networks. IEEE Transactions on Mobile Computing, 3(2): , M. Pease, R. Shostak, and L. Lamport. Reaching agreement in presense of faults. Journal of the ACM, 27(2): , April M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst., 11(8): , L. Tang. Verifiable transaction atomicity for electronic payment protocols. In ICDCS 96: Proceedings of the 16th International Conference on Distributed Computing Systems (ICDCS 96), Washington, DC, USA, IEEE Computer Society. 22. J. Zhou, J. Onieva, and J. Lopez. A synchronous multi-party contract signing protocol improving lower bound of steps. In SEC 2006: 21st IFIP International Information Security Conference, May L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24 30, 1999.
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
An Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.
Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 [email protected] www.cs.ucla.edu/~vzikas Education 2006
Optimal Efficiency of Optimistic Contract Signing
Optimal Efficiency of Optimistic Contract Signing Birgit Pfitzmann Matthias Schunter Michael Waidner Universität des Saarlandes Universität Dortmund IBM urich Research Laboratory
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Impossibility of Distributed Consensus with One Faulty Process
Impossibility of Distributed Consensus with One Faulty Process MICHAEL J. FISCHER Yale University, New Haven, Connecticut NANCY A. LYNCH Massachusetts Institute of Technology, Cambridge, Massachusetts
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time
Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n 2 ) Messages, and O(1) Expected Time Achour Mostéfaoui Hamouma Moumen Michel Raynal, LINA, Université de Nantes, 44322 Nantes Cedex,
Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation Yuval Ishai 1, Eyal Kushilevitz 1, Yehuda Lindell 2, and Erez Petrank 1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)
A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology
J, Cryptoiogy (1996) 9:191-195 Joumol of CRYPTOLOGY O 1996 International Association for Cryptologic Research A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer Yale University
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany [email protected]
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services
Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Yale University Department of Computer Science
Yale University Department of Computer Science On Backtracking Resistance in Pseudorandom Bit Generation (preliminary version) Michael J. Fischer Michael S. Paterson Ewa Syta YALEU/DCS/TR-1466 October
A Survey on Optimistic Fair Digital Signature Exchange Protocols
A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Contract Signing. Contract-Signing Protocols. Another example: stock trading. Example. Network is Asynchronous. Fundamental limitation
ECS Week 2005 Contract-Signing Protocols John itchell Stanford Contract Signing wo parties want to sign a contract ulti-party signing is more complicated he contract is known to both parties he protocols
A Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Protocols for Secure Cloud Computing
IBM Research Zurich Christian Cachin 28 September 2010 Protocols for Secure Cloud Computing 2009 IBM Corporation Where is my data? 1985 2010 Who runs my computation? 1985 2010 IBM Research - Zurich Overview
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Stream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Data Security in Unattended Wireless Sensor Network
Data Security in Unattended Wireless Sensor Network Roberto Di Pietro UNESCO Chair in Data Privacy Di Ma UCI Prof. Luigi Mancini Università di Roma La Sapienza Claudio Soriente UCI Angelo Spognardi INRIA
On the Ubiquity of Logging in Distributed File Systems
On the Ubiquity of Logging in Distributed File Systems M. Satyanarayanan James J. Kistler Puneet Kumar Hank Mashburn School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Logging is
A Certified E-Mail Protocol
A Certified E-Mail Protocol Bruce Schneier Counterpane Systems [email protected] James Riordan IBM Zurich Research Laboratory [email protected] Abstract Protocols to facilitate secure electronic
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Legally Enforceable Fairness in Secure Two-Party Computation
Legally Enforceable Fairness in Secure Two-Party Computation Yehuda Lindell Department of Computer Science Bar-Ilan University, Israel. [email protected] Abstract In the setting of secure multiparty
How to Protect Peer-to-Peer Online Games from Cheats
How to Protect Peer-to-Peer Online Games from Cheats Haruhiro Yoshimoto Rie Shigetomi Hideki Imai University of Tokyo Imai Laboratory, Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba,
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Secret Sharing and Reliable Cloud Computing
Secret Sharing and Reliable Cloud Computing Yvo Desmedt University College London, UK November, 2011 Yvo c Desmedt OVERVIEW 1. Clouds: examples of deployment 2. Clouds: a security nightmare? 3. Secret
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Passive Discovery Algorithms
t t Technische Universität Berlin Telecommunication Networks Group arxiv:1506.05255v1 [cs.ni] 17 Jun 2015 Optimized Asynchronous Passive Multi-Channel Discovery of Beacon-Enabled Networks Niels Karowski,
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Perfectly-Secure MPC with Linear Communication Complexity
Perfectly-Secure MPC with Linear Communication Complexity Zuzana Beerliová-Trubíniová and Martin Hirt ETH Zurich, Department of Computer Science, CH-8092 Zurich {bzuzana,hirt}@inf.ethz.ch Abstract. Secure
Constructing Digital Signatures from a One Way Function
Op. 52 Constructing Digital Signatures from a One Way Function Leslie Lamport Computer Science Laboratory SRI International 18 October 1979 CSL - 98 333 Ravenswood Ave. Menlo Park, California 94025 (415)
Graph Security Testing
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp. 29-45 Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of
