Foundations and applications for secure triggers

"Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer...

Descripción completa

Detalles Bibliográficos
Autores principales: Futoransky, Ariel, Kargieman, Emiliano, Sarraute, Carlos, Waissbein, Ariel
Formato: Artículos de Publicaciones Periódicas acceptedVersion
Lenguaje:Inglés
Publicado: 2018
Materias:
Acceso en línea:http://ri.itba.edu.ar/handle/123456789/1365
Aporte de:
id I32-R138-123456789-1365
record_format dspace
spelling I32-R138-123456789-13652022-12-07T13:06:56Z Foundations and applications for secure triggers Futoransky, Ariel Kargieman, Emiliano Sarraute, Carlos Waissbein, Ariel SEGURIDAD INFORMATICA CRIPTOGRAFIA SOFTWARE "Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer program that should remain ciphered and then “be triggered” (i.e., deciphered and executed) when the underlying system satisfies a preselected condition which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different “declassification” criteria, based on a primitive we call secure triggers. We establish the notion of secure triggers in the universally-composable security framework of [Canetti 2001] and introduce several examples. Our examples demonstrate that a new sort of obfuscation is possible. Finally, we motivate its use with applications in realistic scenarios." 2018-12-07T15:13:52Z 2018-12-07T15:13:52Z 2006-02 Artículos de Publicaciones Periódicas info:eu-repo/semantics/acceptedVersion 1094-9224 http://ri.itba.edu.ar/handle/123456789/1365 en info:eu-repo/semantics/altIdentifier/doi/10.1145/1127345.1127349 application/pdf
institution Instituto Tecnológico de Buenos Aires (ITBA)
institution_str I-32
repository_str R-138
collection Repositorio Institucional Instituto Tecnológico de Buenos Aires (ITBA)
language Inglés
topic SEGURIDAD INFORMATICA
CRIPTOGRAFIA
SOFTWARE
spellingShingle SEGURIDAD INFORMATICA
CRIPTOGRAFIA
SOFTWARE
Futoransky, Ariel
Kargieman, Emiliano
Sarraute, Carlos
Waissbein, Ariel
Foundations and applications for secure triggers
topic_facet SEGURIDAD INFORMATICA
CRIPTOGRAFIA
SOFTWARE
description "Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the confidential content is a piece of code belonging to a computer program that should remain ciphered and then “be triggered” (i.e., deciphered and executed) when the underlying system satisfies a preselected condition which must remain secret after code inspection. In this work we present different solutions for problems of this sort, using different “declassification” criteria, based on a primitive we call secure triggers. We establish the notion of secure triggers in the universally-composable security framework of [Canetti 2001] and introduce several examples. Our examples demonstrate that a new sort of obfuscation is possible. Finally, we motivate its use with applications in realistic scenarios."
format Artículos de Publicaciones Periódicas
acceptedVersion
author Futoransky, Ariel
Kargieman, Emiliano
Sarraute, Carlos
Waissbein, Ariel
author_facet Futoransky, Ariel
Kargieman, Emiliano
Sarraute, Carlos
Waissbein, Ariel
author_sort Futoransky, Ariel
title Foundations and applications for secure triggers
title_short Foundations and applications for secure triggers
title_full Foundations and applications for secure triggers
title_fullStr Foundations and applications for secure triggers
title_full_unstemmed Foundations and applications for secure triggers
title_sort foundations and applications for secure triggers
publishDate 2018
url http://ri.itba.edu.ar/handle/123456789/1365
work_keys_str_mv AT futoranskyariel foundationsandapplicationsforsecuretriggers
AT kargiemanemiliano foundationsandapplicationsforsecuretriggers
AT sarrautecarlos foundationsandapplicationsforsecuretriggers
AT waissbeinariel foundationsandapplicationsforsecuretriggers
_version_ 1765661086097342464