首页> 外文学位 >Computing securely with untrusted resources.
【24h】

Computing securely with untrusted resources.

机译:使用不受信任的资源安全地进行计算。

获取原文
获取原文并翻译 | 示例

摘要

When designing and analyzing cryptosystems, it is usually assumed that the computational devices used by the honest parties have access to resources that are outside of the malicious parties' control. In such a model, it is known, under standard cryptographic assumptions, that essentially any operation can be performed securely as long as a majority of the parties are honest.;In many practical settings, however, the assumption that computational resources can be protected from an adversary does not hold. This dissertation explores various security problems in settings where honest parties wish to make use of computational resources that are under adversarial control. We focus on resources that are fundamental to cryptography, such as randomness and storage.;We first consider the problem of encrypting with a malicious random number generator. We introduce the notions of security against chosen-randomness attacks (CRA) and security against chosen-ciphertext and randomness attacks (CCRA), which formally capture the security of private-key encryption when used with sources of randomness that are under adversarial control. We study the relationships between these notions and the traditional notions of security for encryption. We also show how to design efficient schemes that are CRA-secure, and how to transform any CPA-secure scheme into a CRA-secure one, and any CRA-secure scheme into a CCRA-secure one.;We then turn to the task of authenticating data stored in unreliable memory. We propose a general framework for designing efficient "proofs of data possession", which are proof systems that enable one to convince a verifier that it stores a particular piece of data. We give a compiler that transforms any sigma-protocol (i.e., a three-round public-coin zero-knowledge proof of knowledge) into a proof of data possession.;Finally, we consider the problem of storing private data in untrusted memory. We show how to design private-key encryption schemes that allow one to search over encrypted content. Our constructions are optimal in terms of search time. We also introduce searchable encryption in the multi-user setting, where search privileges can be delegated to a set of authorized users.
机译:在设计和分析密码系统时,通常假定诚实方使用的计算设备可以访问恶意方无法控制的资源。在这种模型中,众所周知,在标准密码学假设下,只要大多数当事方是诚实的,基本上任何操作都可以安全地执行。但是,在许多实际情况下,可以保护计算资源免受对手不成立。本文探讨了诚实用户希望在对抗性控制下使用计算资源的环境中的各种安全问题。我们关注于加密基础的资源,例如随机性和存储。我们首先考虑使用恶意随机数生成器进行加密的问题。我们介绍了针对选定随机性攻击(CRA)的安全性和针对选定密文和随机性攻击的安全性(CCRA)的概念,当与对抗性控制下的随机源一起使用时,它们正式捕获了私钥加密的安全性。我们研究了这些概念与加密安全性的传统概念之间的关系。我们还将展示如何设计CRA安全的有效方案,以及如何将任何CPA安全方案转换为CRA安全方案,以及如何将任何CRA安全方案转换为CCRA安全方案。验证存储在不可靠内存中的数据。我们提出了一个用于设计有效的“数据拥有证明”的通用框架,这些框架是使人们能够说服验证者存储特定数据的证明系统。我们提供了一个将任何sigma协议(即三轮公开硬币零知识证明)转换为数据拥有证明的编译器;最后,我们考虑了将私有数据存储在不受信任的内存中的问题。我们展示了如何设计允许人们搜索加密内容的私钥加密方案。就搜索时间而言,我们的构造是最佳的。我们还在多用户设置中引入了可搜索的加密,其中可以将搜索特权委派给一组授权用户。

著录项

  • 作者

    Kamara, Seny.;

  • 作者单位

    The Johns Hopkins University.;

  • 授予单位 The Johns Hopkins University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2008
  • 页码 137 p.
  • 总页数 137
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号