Foundations and applications for secure triggers
"Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer...
Autores principales: | , , , |
---|---|
Formato: | Artículos de Publicaciones Periódicas acceptedVersion |
Lenguaje: | Inglés |
Publicado: |
2018
|
Materias: | |
Acceso en línea: | http://ri.itba.edu.ar/handle/123456789/1365 |
Aporte de: |
id |
I32-R138-123456789-1365 |
---|---|
record_format |
dspace |
spelling |
I32-R138-123456789-13652022-12-07T13:06:56Z Foundations and applications for secure triggers Futoransky, Ariel Kargieman, Emiliano Sarraute, Carlos Waissbein, Ariel SEGURIDAD INFORMATICA CRIPTOGRAFIA SOFTWARE "Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer program that should remain ciphered and then “be triggered” (i.e., deciphered and executed) when the underlying system satisfies a preselected condition which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different “declassification” criteria, based on a primitive we call secure triggers. We establish the notion of secure triggers in the universally-composable security framework of [Canetti 2001] and introduce several examples. Our examples demonstrate that a new sort of obfuscation is possible. Finally, we motivate its use with applications in realistic scenarios." 2018-12-07T15:13:52Z 2018-12-07T15:13:52Z 2006-02 Artículos de Publicaciones Periódicas info:eu-repo/semantics/acceptedVersion 1094-9224 http://ri.itba.edu.ar/handle/123456789/1365 en info:eu-repo/semantics/altIdentifier/doi/10.1145/1127345.1127349 application/pdf |
institution |
Instituto Tecnológico de Buenos Aires (ITBA) |
institution_str |
I-32 |
repository_str |
R-138 |
collection |
Repositorio Institucional Instituto Tecnológico de Buenos Aires (ITBA) |
language |
Inglés |
topic |
SEGURIDAD INFORMATICA CRIPTOGRAFIA SOFTWARE |
spellingShingle |
SEGURIDAD INFORMATICA CRIPTOGRAFIA SOFTWARE Futoransky, Ariel Kargieman, Emiliano Sarraute, Carlos Waissbein, Ariel Foundations and applications for secure triggers |
topic_facet |
SEGURIDAD INFORMATICA CRIPTOGRAFIA SOFTWARE |
description |
"Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer program that should remain ciphered and then “be triggered” (i.e., deciphered and executed) when the underlying system satisfies a preselected condition which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different “declassification” criteria, based on a primitive we call secure triggers. We establish the notion of secure triggers in the universally-composable security framework of [Canetti 2001] and introduce several examples. Our examples demonstrate that a new sort of obfuscation is possible. Finally, we motivate its use with applications in realistic scenarios." |
format |
Artículos de Publicaciones Periódicas acceptedVersion |
author |
Futoransky, Ariel Kargieman, Emiliano Sarraute, Carlos Waissbein, Ariel |
author_facet |
Futoransky, Ariel Kargieman, Emiliano Sarraute, Carlos Waissbein, Ariel |
author_sort |
Futoransky, Ariel |
title |
Foundations and applications for secure triggers |
title_short |
Foundations and applications for secure triggers |
title_full |
Foundations and applications for secure triggers |
title_fullStr |
Foundations and applications for secure triggers |
title_full_unstemmed |
Foundations and applications for secure triggers |
title_sort |
foundations and applications for secure triggers |
publishDate |
2018 |
url |
http://ri.itba.edu.ar/handle/123456789/1365 |
work_keys_str_mv |
AT futoranskyariel foundationsandapplicationsforsecuretriggers AT kargiemanemiliano foundationsandapplicationsforsecuretriggers AT sarrautecarlos foundationsandapplicationsforsecuretriggers AT waissbeinariel foundationsandapplicationsforsecuretriggers |
_version_ |
1765661086097342464 |