Corpus ID: 12873988

Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control

@article{Kaptchuk2017ManagingSW,
  title={Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control},
  author={Gabriel Kaptchuk and Ian Miers and Matthew Green},
  journal={IACR Cryptol. ePrint Arch.},
  year={2017},
  volume={2017},
  pages={201}
}
In this work we investigate the problem of using public consensus networks – exemplified by systems like Ethereum and Bitcoin – to perform cryptographic functionalities that involve the manipulation of secret data, such as cryptographic access control. We consider a hybrid paradigm in which a secure client-side functionality manages cryptographic secrets, while an online consensus network performs public computation. Using this approach, we explore both the constructive and potentially… Expand
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
TLDR
This work considers a hybrid paradigm in which a client-side device performs secure computation, while interacting with a public ledger via a possibly malicious host computer, and shows that this combination allows for the construction of stateful interactive functionalities even when the device has no persistent storage. Expand
Enclave Host Ledger k Enclave Host Ledger k Enclave Host k Enclave Host k ( a ) ( b )
In this work we investigate the problem of achieving secure computation by combining stateless trusted devices with public ledgers. We consider a hybrid paradigm in which a client-side device (suchExpand
NuCypher : A proxy re-encryption network to empower privacy in decentralized systems
NuCypher is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data [1]. It provides encryptionExpand
Overcoming Cryptographic Impossibility Results Using Blockchains
TLDR
This work provides an abstract framework for formally analyzing and defining useful security properties for Proof-of-Stake (POS) based blockchain protocols and introduces the notion of pay-per-use programs which is simply a contract between two parties — service provider and customer. Expand
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
TLDR
This work proposes a membership service architecture that combines two promising technologies, distributed ledger and Intel Software Guard Extensions (SGX), and illustrates how SGX capabilities help to achieve security properties in each phase of membership service, including member registration, enrollment, transaction signing and verifying and transacting auditing. Expand
NuCypher KMS: Decentralized key management system
TLDR
NuCypher KMS provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption, that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. Expand
Blockchain Privacy-Preservation in Intelligent Transportation Systems
TLDR
This paper describes the architecture of a car navigation system in which personal data protection is a major concern and aims to streamline traffic and calculate travel routes using blockchain technology. Expand
Break-glass Encryption
“Break-glass” is a term used in IT healthcare systems to denote an emergency access to private information without having the credentials to do so.

References

SHOWING 1-10 OF 62 REFERENCES
1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
TLDR
The main result is constructions of 1/p-secure protocols that are resilient against any number of corrupt parties provided that the number of parties is constant and the size of the range of the functionality is at most polynomial (in the security parameter n). Expand
Secure Multiparty Computations on Bitcoin
TLDR
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions. Expand
How to generate and exchange secrets
  • A. Yao
  • 27th Annual Symposium on Foundations of Computer Science (sfcs 1986)
  • 1986
In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is applied to solve a general class of problems which include most of theExpand
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe
TLDR
This paper provides a condensed description of MaidSafe's key protocol mechanisms, derives the underlying identity and access management architecture, and evaluates it with respect to security and privacy aspects. Expand
Partial Fairness in Secure Two-Party Computation
TLDR
A definition of partial fairness within the standard real-/ideal-world paradigm is proposed and it is shown that there exist functions with super-polynomial domains and ranges for which it is impossible to achieve the definition. Expand
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
TLDR
This work shows how trusted hardware systems such as SGX can support trustworthy applications even in the presence of side channels, and proposes, formalize, and explores a cryptographic primitive called a Sealed-Glass Proof (SGP) that models computation possible in an isolated execution environment with unbounded leakage, and thus in the face of arbitrary side-channels. Expand
Chosen-Ciphertext Security from Tag-Based Encryption
TLDR
This paper revisits the notion of Tag-Based Encryption (TBE) and provides security definitions for the selective-tag case and shows how to apply the techniques gained from the TBE construction to directly design a new Key Encapsulation Mechanism. Expand
Cloaking Malware with the Trusted Platform Module
TLDR
It is shown that malware can use cloaked computations to hide essential secrets from a malware analyst and hardening legitimate uses of the TPM against attack improves the resilience of the malware. Expand
Decentralized Anonymous Credentials
TLDR
This work proposes a novel anonymous credential scheme that eliminates the need for a trusted credential issuer and provides a proof of security for a basic anonymous credential system that allows users to make flexible identity assertions with strong privacy guarantees without relying on trusted parties. Expand
How to build time-lock encryption
  • Tibor Jager
  • Mathematics, Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2015
TLDR
A new construction of a witness encryption scheme, based on Subset-Sum, achieves extractable security without relying on obfuscation and is independent of the implementations of multilinear maps. Expand
...
1
2
3
4
5
...