Corpus ID: 64358506

Cryptography and evidence

@inproceedings{Roe2010CryptographyAE,
  title={Cryptography and evidence},
  author={Michael Roe},
  year={2010}
}
  • M. Roe
  • Published 2010
  • Computer Science
The invention of public-key cryptography led to the notion that cryptographically protected messages could be used as evidence to convince an impartial adjudicator that a disputed event had in fact occurred. Information stored in a computer is easily modified, and so records can be falsified or retrospectively modified. Cryptographic protection prevents modification, and it is hoped that this will make cryptographically protected data acceptable as evidence. This usage of cryptography to render… Expand
Enhancing the reliability of digital signatures as non-repudiation evidence under a holistic threat model
Traditional sensitive operations, like banking transactions, purchase processes, contract agreements etc. need to tie down the involved parties respecting the commitments made, avoiding a furtherExpand
The Impact of Attestation on Deniable Communications
TLDR
It is shown that the potential availability of remote attestation implies that unconditionally deniable protocols are impossible if they also provide message authentication, and some possible countermeasures that restore deniability are introduced. Expand
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness
TLDR
The result shows that the proposed method is effective to find out flaws that related to the two security properties above, and a case study of flaw detection for non-repudiation and fairness in ISI protocol is shown. Expand
Technologie wspierające prywatność – ideologia, prawo, wdrożenia
Privacy Enhancing Technologies (PET) create a threat to the social order which is shown in the analysis of their ideological as well as political foundations and legal regulations that introduceExpand
LINDDUN : a privacy threat analysis framework
  • 2012
Ready or not, the digitalization of information has come and privacy is standing out there, possibly at stake. Although digital privacy is an identified priority in our society, few systematic,Expand
On the (un)reliability of eavesdropping
TLDR
It is shown that obtaining 'high fidelity' transcripts is harder than previously assumed and simple unilateral countermeasures are shown to be sufficient to prevent all tested systems from reliably reconstructing communicated messages. Expand
Living in an Impossible World: Real-izing the Consequences of Intransitive Trust
TLDR
This paper takes the stance that controlling the transitivity of trust requires to recognise trust as a non-referentially transparent modality, similar to but significantly weaker than the epistemic modalities, and to accept the corollary that imaginary threats can have real consequences that adversely affect online security. Expand
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
TLDR
This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above. Expand
Privacy Threats in Software Architectures
TLDR
LINDDUN is a privacy threat modeling methodology that helps software engineers with limited privacy expertise to introduce privacy early on in the software development lifecycle that leverages a data flow diagram (DFD) as representation of the system to be analyzed. Expand
Towards a localisation of trust framework for pervasive environments
TLDR
Localisation of Trust (LoT) is presented, an architectural framework designed to address the security need of how to talk to correct strangers in pervasive environments by providing a generic platform for building access control over multiple domains from two ends: authentication and authorisation. Expand
...
1
2
...

References

SHOWING 1-10 OF 66 REFERENCES
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
TLDR
This paper presents the SETUP (Secretly Embedded Trapdoor with Universal Protection) mechanism, which can be embedded in a cryptographic black-box device, and implemented an RSA key-generation based SETUP that performs favorably when compared to PGP, a readily available RSA implementation. Expand
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols. Expand
A logic of authentication
TLDR
This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols. Expand
Non-repudiation with mandatory proof of receipt
TLDR
The fundamental feature of the scheme is that the proofs of origin and receipt are not exchanged until both principals have submitted their digitally signed evidence to a trusted third party intermediary, ensuring that if the non-repudiation protocol is not completed, neither principal can gain from the exchange. Expand
An overview of public key cryptography
  • M. Hellman
  • Computer Science
  • IEEE Communications Magazine
  • 2002
TLDR
Public key cryptography, the subject of this paper, is critical in allowing that ease of use and the promulgation of the Advanced Encryption Standard (AES) is an important step in this direction. Expand
[서평]「Applied Cryptography」
The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practicalExpand
Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures
This document defines message encryption and authentication procedures, in order to provide privacy-enhanced mail (PEM) services for electronic mail transfer in the Internet. It is intended to becomeExpand
Subliminal Communication is Easy Using the DSA
TLDR
The broadband channel is discussed, which can use all of the bits contained in the signature that are not used to provide for the security of the signature against forgery, alteration or transplantation and is hence said to be broadband. Expand
Threshold Cryptosystems
TLDR
Practical non-interactive public key systems are proposed which allow the reuse of the shared secret key since the key is not revealed either to insiders or to outsiders. Expand
...
1
2
3
4
5
...